Sciweavers

497 search results - page 51 / 100
» Privacy Enhanced Technologies: Methods - Markets - Misuse
Sort
View
DAWAK
2006
Springer
15 years 8 months ago
Two New Techniques for Hiding Sensitive Itemsets and Their Empirical Evaluation
Many privacy preserving data mining algorithms attempt to selectively hide what database owners consider as sensitive. Specifically, in the association-rules domain, many of these ...
Ahmed HajYasien, Vladimir Estivill-Castro
ISI
2006
Springer
15 years 4 months ago
Motion-Alert: Automatic Anomaly Detection in Massive Moving Objects
Abstract. With recent advances in sensory and mobile computing technology, enormous amounts of data about moving objects are being collected. With such data, it becomes possible to...
Xiaolei Li, Jiawei Han, Sangkyum Kim
SEDE
2007
15 years 5 months ago
BeLearning: Designing accessible web applications
Flexibility and adaptivity are two of the outstanding characteristics of new media and new technologies. These properties allow new methods to provide physically challenged people...
Helmut Vieritz, Sabina Jeschke
ESAW
2003
Springer
15 years 9 months ago
A Liberal Approach to Openness in Societies of Agents.
We outline a model for a society of agents based upon one of the classical theories of sociology: The Weber’s model. We first investigate its links to agent technology through i...
Jacques Calmet, Anusch Daemi, Regine Endsuleit, Th...
FMCO
2008
Springer
167views Formal Methods» more  FMCO 2008»
15 years 6 months ago
Formal Behavioral Modeling and Compliance Analysis for Service-Oriented Systems
In this paper, we present a framework for formal modeling and verification of service-based business processes with focus on their compliance to external regulations such as Segreg...
Natallia Kokash, Farhad Arbab