Sciweavers

1335 search results - page 208 / 267
» Privacy in Database Publishing
Sort
View
HICSS
2005
IEEE
126views Biometrics» more  HICSS 2005»
15 years 10 months ago
Email Chronemics: Unobtrusive Profiling of Response Times
One of the unknowns of emailing is the time it will take the receiver to form and post a reply. Response times vary considerably, and the chronemics of email are an important non-...
Yoram M. Kalman, Sheizaf Rafaeli
147
Voted
SDMW
2005
Springer
15 years 10 months ago
An Authorization Framework for Sharing Data in Web Service Federations
In this paper we present our authorization framework that supports the dynamic set-up of Web service federations for sharing data within virtual federations. Building on previous w...
Martin Wimmer, Alfons Kemper
CSMR
2003
IEEE
15 years 10 months ago
Software Services and Software Maintenance
Software services are being promoted as the next big step forward in software engineering.. Inevitably, both service vendor and service client programs will require maintenance. W...
Keith H. Bennett, Jie Xu
CIKM
2008
Springer
15 years 6 months ago
Exploiting context to detect sensitive information in call center conversations
Protecting sensitive information while preserving the shareability and usability of data is becoming increasingly important. In call-centers a lot of customer related sensitive in...
Tanveer A. Faruquie, Sumit Negi, Anup Chalamalla, ...
ICAIL
2007
ACM
15 years 6 months ago
P2P systems in legal networks: another "small world" case
The “small world”-paradigm offers a new interesting viewpoint for the analysis of contemporary legal networks and artificial intelligence. This topological approach sheds fu...
Ugo Pagallo, Giancarlo Ruffo