Sciweavers

8701 search results - page 58 / 1741
» Protecting information on the Web
Sort
View
EJWCN
2010
119views more  EJWCN 2010»
13 years 4 months ago
Embedding Protection Inside H.264/AVC and SVC Streams
into the H.264 bitstream of supplementary network abstraction layer (NAL) units that contain forward error-correction (FEC) data generated by a block error-correction code. The pro...
Catherine Lamy-Bergot, Benjamin Gadat
COMAD
2008
13 years 11 months ago
Ambiguity: Hide the Presence of Individuals and Their Privacy with Low Information Loss
Publishing a database instance containing individual information poses two kinds of privacy risk: presence leakage, by which the attackers can explicitly identify individuals in (...
Hui Wang
ICTAI
1997
IEEE
14 years 2 months ago
Web Mining: Information and Pattern Discovery on the World Wide Web
Application of data mining techniques to the World Wide Web, referred to as Web mining, has been the focus of several recent research projects and papers. However, there is no est...
Robert Cooley, Bamshad Mobasher, Jaideep Srivastav...
SIGCSE
2005
ACM
129views Education» more  SIGCSE 2005»
14 years 3 months ago
Teaching students to hack: curriculum issues in information security
1 Teaching “hacking” as a legitimate means of training students in how to protect a future employer’s data assets has been introduced
Patricia Y. Logan, Allen Clarkson
SOFSEM
2007
Springer
14 years 4 months ago
Creating Permanent Test Collections of Web Pages for Information Extraction Research
In the research area of automatic web information extraction, there is a need for permanent and annotated web page collections enabling objective performance evaluation of differen...
Bernhard Pollak, Wolfgang Gatterbauer