Sciweavers

240 search results - page 22 / 48
» Privacy and Utility in Business Processes
Sort
View
ICDE
2006
IEEE
144views Database» more  ICDE 2006»
15 years 8 days ago
Network-Aware Operator Placement for Stream-Processing Systems
To use their pool of resources efficiently, distributed stream-processing systems push query operators to nodes within the network. Currently, these operators, ranging from simple...
Peter R. Pietzuch, Jonathan Ledlie, Jeffrey Shneid...
HICSS
2006
IEEE
146views Biometrics» more  HICSS 2006»
14 years 5 months ago
Contextual e-Negotiation for the Handling of Private Data in e-Commerce on a Semantic Web
In this paper, we describe data support in an information system to support contextual, online negotiation of privacy contracts for e-commerce on the Semantic Web. Context is impo...
Yingxin (Sheila) He, Dawn N. Jutla
SP
1987
IEEE
118views Security Privacy» more  SP 1987»
14 years 2 months ago
A Comparison of Commercial and Military Computer Security Policies
Most discussions of computer security focus on control of disclosure. In Particular, the U.S. Department of Defense has developed a set of criteria for computer mechanisms to prov...
D. D. Clark, D. R. Wilson
MR
2007
173views Robotics» more  MR 2007»
13 years 10 months ago
A maintenance planning and business case development model for the application of prognostics and health management (PHM) to ele
- This paper presents a model that enables the optimal interpretation of Prognostics and Health Management (PHM) results for electronic systems. In this context, optimal interpreta...
Peter A. Sandborn, Chris Wilkinson
ESWA
2008
219views more  ESWA 2008»
13 years 11 months ago
Business intelligence approach to supporting strategy-making of ISP service management
The recent deregulation of telecommunication industry by the Taiwanese government has brought about the acute competition for Internet Service Providers (ISP). Taiwan's ISP i...
Sheng-Tun Li, Li-Yen Shue, Shu-Fen Lee