Sciweavers

126 search results - page 6 / 26
» New Frontiers in Business Intelligence: Distribution and Per...
Sort
View
EDBT
2004
ACM
234views Database» more  EDBT 2004»
14 years 7 months ago
A Condensation Approach to Privacy Preserving Data Mining
In recent years, privacy preserving data mining has become an important problem because of the large amount of personal data which is tracked by many business applications. In many...
Charu C. Aggarwal, Philip S. Yu
ICDM
2009
IEEE
113views Data Mining» more  ICDM 2009»
14 years 2 months ago
Connecting Sparsely Distributed Similar Bloggers
—The nature of the Blogosphere determines that the majority of bloggers are only connected with a small number of fellow bloggers, and similar bloggers can be largely disconnecte...
Nitin Agarwal, Huan Liu, Shankara B. Subramanya, J...
ICEIS
2000
IEEE
14 years 1 days ago
Syntax-Directed Translation Schemes for Multi-Agent Systems Conversation Modelling
: In modern organisations the monolithic information systems of the past are being gradually replaced by networked systems, enabling distributed computing often based on multi-agen...
Ana L. N. Fred, Joaquim Filipe
CIA
2006
Springer
13 years 11 months ago
The Helpful Environment: Distributed Agents and Services Which Cooperate
Imagine a future environment where networks of agents - people, robots and software agents - interact with sophisticated sensor grids and environmental actuators to provide advice,...
Austin Tate
CSREASAM
2003
13 years 9 months ago
Security Policy Management for Handheld Devices
The adoption of wireless technologies and handheld devices is becoming widespread in business, industry, and government organizations. The use of handheld devices introduces new r...
Wayne A. Jansen, Tom Karygiannis, Michaela Iorga, ...