Sciweavers

344 search results - page 18 / 69
» Process Modeling as a Basis for Auditing Information Privacy
Sort
View
KDD
2002
ACM
157views Data Mining» more  KDD 2002»
14 years 9 months ago
Transforming data to satisfy privacy constraints
Data on individuals and entities are being collected widely. These data can contain information that explicitly identifies the individual (e.g., social security number). Data can ...
Vijay S. Iyengar
CAISE
2009
Springer
14 years 24 days ago
Configurable Process Models: Experiences from a Municipality Case Study
Configurable process models integrate different variants of a business process into a single model. Through configuration users of such models can then combine the variants to deri...
Florian Gottschalk, Teun A. C. Wagemakers, Monique...
PUC
2002
82views more  PUC 2002»
13 years 8 months ago
A Location Model for Communicating and Processing of Context
Location is one of the most important elements of context in ubiquitous computing. In this paper we describe a location model, a spatial-aware communication model and an implement...
Michael Beigl, Tobias Zimmer, Christian Decker
IVS
2006
127views more  IVS 2006»
13 years 8 months ago
Feature hiding in 3D human body scans
In this paper, we explore a privacy algorithm that detects human private parts in a 3D scan data set. The analogia graph is introduced to study the proportion of structures. The i...
Joseph Laws, Nathaniel Bauernfeind, Yang Cai 0002
JITECH
2010
160views more  JITECH 2010»
13 years 3 months ago
Social software for business process modeling
Formal models of business processes are used for a variety of purposes. But where the elicitation of the characteristics of a business process usually takes place in a collaborati...
Agnes Koschmider, Minseok Song, Hajo A. Reijers