Sciweavers

2272 search results - page 294 / 455
» Provable Data Privacy
Sort
View
CEAS
2008
Springer
15 years 4 months ago
Analysis of Spectral Parameters of Audio Signals for the Identification of Spam Over IP Telephony
A method is presented which analyses the audio speech data of voice calls and calculates an "acoustic fingerprint". The audio data of the voice calls are compared with e...
Christoph Pörschmann, Heiko Knospe
88
Voted
NSDI
2008
15 years 4 months ago
Ad-hoc Guesting: When Exceptions Are the Rule
People's work days are filled with exceptions to normal routine. These exceptions affect the security and privacy of their information access and sharing. In a recent ethnogr...
Brinda Dalal, Les Nelson, Diana K. Smetters, Natha...
102
Voted
CSREASAM
2008
15 years 4 months ago
Design of an Automatic Password Protection Mechanism for Digital Documents
- Maintaining digital security and privacy are critical issues in the modern workplace. Sensitive and proprietary data is frequently transmitted electronically, and with the large ...
Shashank Kaushik, Thomas Way
114
Voted
AISM
2004
15 years 4 months ago
Need to Know: Security or Liability?
The `Need to Know' concept is often quoted but rarely defined in the literature. In general the principle directs that unless an individual has a specific reason to have acce...
Christopher Bolan
SIGKDD
2000
150views more  SIGKDD 2000»
15 years 2 months ago
KDD-Cup 2000 Organizers' Report: Peeling the Onion
We describe KDD-Cup 2000, the yearly competition in data mining. For the first time the Cup included insight problems in addition to prediction problems, thus posing new challenge...
Ron Kohavi, Carla E. Brodley, Brian Frasca, Llew M...