Sciweavers

1005 search results - page 176 / 201
» Privacy Preserving Clustering
Sort
View
131
Voted
PVLDB
2008
116views more  PVLDB 2008»
15 years 3 months ago
Anonymizing bipartite graph data using safe groupings
Private data often comes in the form of associations between entities, such as customers and products bought from a pharmacy, which are naturally represented in the form of a larg...
Graham Cormode, Divesh Srivastava, Ting Yu, Qing Z...
145
Voted
OTM
2010
Springer
15 years 2 months ago
A Process View Framework for Artifact-Centric Business Processes
Over the past several years, the artifact-centric approach to workflow has emerged as a new paradigm of business process modelling. It provides a robust structure of workflow and s...
Sira Yongchareon, Chengfei Liu
137
Voted
GLOBECOM
2010
IEEE
15 years 1 months ago
Practical Defenses for Evil Twin Attacks in 802.11
Open-access 802.11 wireless networks are commonly deployed in cafes, bookstores, and other public spaces to provide free Internet connectivity. These networks are convenient to dep...
Harold Gonzales, Kevin S. Bauer, Janne Lindqvist, ...
127
Voted
IEAAIE
2010
Springer
15 years 1 months ago
Strategies for Incorporating Knowledge Defects and Path Length in Trust Aggregation
The ability for a user to accurately estimate the amount of trust to be placed in a peer user is gaining more and more attention in social network applications. Trust aggregation p...
Nele Verbiest, Chris Cornelis, Patricia Victor, En...
120
Voted
JAMIA
2010
91views more  JAMIA 2010»
14 years 10 months ago
Serving the enterprise and beyond with informatics for integrating biology and the bedside (i2b2)
Informatics for Integrating Biology and the Bedside (i2b2) is one of seven projects sponsored by the NIH Roadmap National Centers for Biomedical Computing (http://www. ncbcs.org)....
Shawn N. Murphy, Griffin Weber, Michael Mendis, Vi...