Sciweavers

374 search results - page 25 / 75
» Rights Protection for Relational Data
Sort
View
EMISA
2009
Springer
14 years 3 months ago
Access Control for Monitoring System-Spanning Business Processes in Proviado
: Integrated process support is highly desirable in environments where data related to a particular (business) process are scattered over distributed, heterogeneous information sys...
Sarita Bassil, Manfred Reichert, Ralph Bobrik
CIKM
2008
Springer
13 years 10 months ago
Exploiting context to detect sensitive information in call center conversations
Protecting sensitive information while preserving the shareability and usability of data is becoming increasingly important. In call-centers a lot of customer related sensitive in...
Tanveer A. Faruquie, Sumit Negi, Anup Chalamalla, ...
IPPS
2006
IEEE
14 years 2 months ago
Enhancing L2 organization for CMPs with a center cell
Chip multiprocessors (CMPs) are becoming a popular way of exploiting ever-increasing number of on-chip transistors. At the same time, the location of data on the chip can play a c...
Chun Liu, Anand Sivasubramaniam, Mahmut T. Kandemi...
SACMAT
2009
ACM
14 years 3 months ago
Automating role-based provisioning by learning from examples
Role-based provisioning has been adopted as a standard component in leading Identity Management products due to its low administration cost. However, the cost of adjusting existin...
Qun Ni, Jorge Lobo, Seraphin B. Calo, Pankaj Rohat...
GECCO
2007
Springer
163views Optimization» more  GECCO 2007»
14 years 2 months ago
Exploring medical data using visual spaces with genetic programming and implicit functional mappings
Two medical data sets (Breast cancer and Colon cancer) are investigated within a visual data mining paradigm through the unsupervised construction of virtual reality spaces using ...
Julio J. Valdés, Robert Orchard, Alan J. Ba...