Sciweavers

240 search results - page 39 / 48
» Privacy and Utility in Business Processes
Sort
View
DEXA
2007
Springer
140views Database» more  DEXA 2007»
14 years 5 months ago
Clustering-Based K-Anonymisation Algorithms
Abstract. K-anonymisation is an approach to protecting private information contained within a dataset. Many k-anonymisation methods have been proposed recently and one class of suc...
Grigorios Loukides, Jianhua Shao
EUROPAR
2009
Springer
14 years 5 months ago
Provider-Independent Use of the Cloud
Abstract. Utility computing offers researchers and businesses the potential of significant cost-savings in that it is possible for them to match the cost of their computing and s...
Terence J. Harmer, Peter Wright, Christina Cunning...
GRID
2007
Springer
14 years 5 months ago
A highly available job execution service in computational service market
— One of the major challenges in managing resources of computational Grids with diverse shared resources is how to meet users' QoS requirements and rationally distribute res...
Woochul Kang, H. Howie Huang, Andrew S. Grimshaw
ICN
2001
Springer
14 years 3 months ago
Management and Realization of SLA for Providing Network QoS
We consider an SLA (Service Level Agreement) committed between two parties to use the guarantee of QoS provided by a QoS Enabled Network (QEN). QEN can provide guarantee of QoS bec...
Manzoor Hashmani, Mikio Yoshida, Takeshi Ikenaga, ...
AH
2008
Springer
14 years 5 months ago
A Scrutable User Modelling Infrastructure for Enabling Life-Long User Modelling
User Modelling is the core component for the majority of personalisation systems. By keeping a model for every user, a system can successfully personalise its content and utilise a...
Demetris Kyriacou