Sciweavers

487 search results - page 69 / 98
» Personal Information Management (PIM) for Intelligence Analy...
Sort
View
EDBT
2010
ACM
237views Database» more  EDBT 2010»
14 years 2 months ago
BronzeGate: real-time transactional data obfuscation for GoldenGate
Data privacy laws have appeared recently, such as the HIPAA laws for protecting medical records, and the PCI guidelines for protecting Credit Card information. Data privacy can be...
Shenoda Guirguis, Alok Pareek
CORR
2011
Springer
196views Education» more  CORR 2011»
12 years 11 months ago
Privacy-Enhanced Reputation-Feedback Methods to Reduce Feedback Extortion in Online Auctions
In this paper, we study methods for improving the utility and privacy of reputation scores for online auctions, such as used in eBay, so as to reduce the effectiveness of feedbac...
Michael T. Goodrich, Florian Kerschbaum
DSS
2000
82views more  DSS 2000»
13 years 7 months ago
A sales agent for part manufacturers: VMSA
The sales activity of most parts manufacturing companies is based on orders of buyers. The process of promotion, receipt and selection of orders of the parts manufacturers is clos...
Hyung Rim Choi, Hyun Soo Kim, Young Jae Park, Kyou...
EDBTW
2010
Springer
13 years 11 months ago
The benefits of the interaction between data warehouses and question answering
Business Intelligence (BI) applications allow their users to query, understand, and analyze existing data within their organizations in order to acquire useful knowledge, thus mak...
Antonio Ferrández, Jesús Peral
JIDM
2010
160views more  JIDM 2010»
13 years 6 months ago
Evaluation of Conditional Preference Queries
The need for incorporating preference querying in database technology is a very important issue in a variety of applications ranging from e-commerce to personalized search engines....
Fabiola S. F. Pereira, Sandra de Amo