Sciweavers

2272 search results - page 361 / 455
» Provable Data Privacy
Sort
View
158
Voted
CIKM
2008
Springer
15 years 4 months ago
Exploiting context to detect sensitive information in call center conversations
Protecting sensitive information while preserving the shareability and usability of data is becoming increasingly important. In call-centers a lot of customer related sensitive in...
Tanveer A. Faruquie, Sumit Negi, Anup Chalamalla, ...
ECIR
2007
Springer
15 years 4 months ago
Personalized Communities in a Distributed Recommender System
The amount of data exponentially increases in information systems and it becomes more and more difficult to extract the most relevant information within a very short time. Among ot...
Sylvain Castagnos, Anne Boyer
SDM
2010
SIAM
115views Data Mining» more  SDM 2010»
15 years 4 months ago
Reconstructing Randomized Social Networks
In social networks, nodes correspond to entities and edges to links between them. In most of the cases, nodes are also associated with a set of features. Noise, missing values or ...
Niko Vuokko, Evimaria Terzi
SEC
2007
15 years 3 months ago
Ontological Mapping of Common Criteria's Security Assurance Requirements
The Common Criteria (CC) for Information Technology Security Evaluation provides comprehensive guidelines for the evaluation and certification of IT security regarding data securit...
Andreas Ekelhart, Stefan Fenz, Gernot Goluch, Edga...
DGO
2004
109views Education» more  DGO 2004»
15 years 3 months ago
Citizens Preferences Towards One-Stop Government
The poster presents the major results of a survey conducted in several German cities to asses preferences citizens have towards aspects of One-Stop Government. One Stop Government...
Alexander Schellong, Dieter Mans