Sciweavers

2272 search results - page 361 / 455
» Provable Data Privacy
Sort
View
CIKM
2008
Springer
13 years 11 months ago
Exploiting context to detect sensitive information in call center conversations
Protecting sensitive information while preserving the shareability and usability of data is becoming increasingly important. In call-centers a lot of customer related sensitive in...
Tanveer A. Faruquie, Sumit Negi, Anup Chalamalla, ...
ECIR
2007
Springer
13 years 10 months ago
Personalized Communities in a Distributed Recommender System
The amount of data exponentially increases in information systems and it becomes more and more difficult to extract the most relevant information within a very short time. Among ot...
Sylvain Castagnos, Anne Boyer
SDM
2010
SIAM
115views Data Mining» more  SDM 2010»
13 years 10 months ago
Reconstructing Randomized Social Networks
In social networks, nodes correspond to entities and edges to links between them. In most of the cases, nodes are also associated with a set of features. Noise, missing values or ...
Niko Vuokko, Evimaria Terzi
SEC
2007
13 years 10 months ago
Ontological Mapping of Common Criteria's Security Assurance Requirements
The Common Criteria (CC) for Information Technology Security Evaluation provides comprehensive guidelines for the evaluation and certification of IT security regarding data securit...
Andreas Ekelhart, Stefan Fenz, Gernot Goluch, Edga...
DGO
2004
109views Education» more  DGO 2004»
13 years 10 months ago
Citizens Preferences Towards One-Stop Government
The poster presents the major results of a survey conducted in several German cities to asses preferences citizens have towards aspects of One-Stop Government. One Stop Government...
Alexander Schellong, Dieter Mans