Sciweavers

8701 search results - page 62 / 1741
» Protecting information on the Web
Sort
View
KDD
2007
ACM
192views Data Mining» more  KDD 2007»
14 years 10 months ago
Allowing Privacy Protection Algorithms to Jump Out of Local Optimums: An Ordered Greed Framework
Abstract. As more and more person-specific data like health information becomes available, increasing attention is paid to confidentiality and privacy protection. One proposed mode...
Rhonda Chaytor
SC
2009
ACM
14 years 4 months ago
Flexible cache error protection using an ECC FIFO
We present ECC FIFO, a mechanism enabling two-tiered last-level cache error protection using an arbitrarily strong tier-2 code without increasing on-chip storage. Instead of addin...
Doe Hyun Yoon, Mattan Erez
INFOCOM
2007
IEEE
14 years 4 months ago
Revenue Focused Protection for VOD in DWDM Rings
—New protection schemes for video on demand (VOD) in a DWDM ring network are proposed that employ information per customer. Unlike prior schemes that rely on fixed priorities, th...
Ornan Ori Gerstel, Galen H. Sasaki, Ashok Balasubr...
ERCIMDL
2007
Springer
111views Education» more  ERCIMDL 2007»
14 years 4 months ago
Using Watermarks and Offline DRM to Protect Digital Images in DIAS
The Digital Image Archiving System (DIAS) is an image management system, the major functions of which are preserving valuable digital images and serving as an image provider for ex...
Hsin-Yu Chen, Hsiang-An Wang, Chin-Lung Lin
SIGMOD
2002
ACM
187views Database» more  SIGMOD 2002»
14 years 10 months ago
A Conceptual Architecture for Semantic Web Enabled Web Services
Semantic Web Enabled Web Services (SWWS) will transform the web from a static collection of information into a distributed device of computation on the basis of Semantic Web techn...
Christoph Bussler, Dieter Fensel, Alexander Maedch...