Sciweavers

15379 search results - page 386 / 3076
» Protecting users from
Sort
View
ESI
2010
85views more  ESI 2010»
15 years 2 months ago
Application of uncertainty visualization methods to meteorological trajectories
— We present applications of uncertainty visualization methods to a global meteorological model, allowing better understanding of the composition of the local environment of deve...
Ryan A. Boller, Scott A. Braun, Jadrian Miles, Dav...
PKDD
2010
Springer
131views Data Mining» more  PKDD 2010»
15 years 2 months ago
Flu Detector - Tracking Epidemics on Twitter
Abstract. We present an automated tool with a web interface for tracking the prevalence of Influenza-like Illness (ILI) in several regions of the United Kingdom using the contents...
Vasileios Lampos, Tijl De Bie, Nello Cristianini
130
Voted
CORR
2010
Springer
162views Education» more  CORR 2010»
15 years 1 months ago
Differential Privacy versus Quantitative Information Flow
Differential privacy is a notion of privacy that has become very popular in the database community. Roughly, the idea is that a randomized query mechanism provides sufficient priva...
Mário S. Alvim, Konstantinos Chatzikokolaki...
152
Voted
JDCTA
2010
150views more  JDCTA 2010»
14 years 11 months ago
A Knowledge Recommend System Based on User Model
The content and searching method of knowledge base are lack of the consideration of user requirements, it is difficult for the user to select the knowledge satisfy with the user r...
Jiagen Sheng, Sifeng Liu
SP
2008
IEEE
119views Security Privacy» more  SP 2008»
15 years 10 months ago
Verifying the Safety of User Pointer Dereferences
Operating systems divide virtual memory addresses into kernel space and user space. The interface of a modern operating system consists of a set of system call procedures that may...
Suhabe Bugrara, Alex Aiken