Sciweavers

892 search results - page 10 / 179
» Risks of rapid application development
Sort
View
EDBTW
2010
Springer
14 years 4 months ago
A method for evaluating marketer re-identification risk
Disclosures of health databases for secondary purposes is increasing rapidly. In this paper, we develop and evaluate a reidentification risk metric for the case where an intruder ...
Fida Kamal Dankar, Khaled El Emam
ICPP
2008
IEEE
14 years 4 months ago
On the Design of Fast Pseudo-Random Number Generators for the Cell Broadband Engine and an Application to Risk Analysis
Numerical simulations in computational physics, biology, and finance, often require the use of high quality and efficient parallel random number generators. We design and optimi...
David A. Bader, Aparna Chandramowlishwaran, Virat ...
WWW
2011
ACM
13 years 4 months ago
Citizen sensor data mining, social media analytics and development centric web applications
With the rapid rise in the popularity of social media (500M+ Facebook users, 100M+ twitter users), and near ubiquitous mobile access (4.1 billion actively-used mobile phones), the...
Meenakshi Nagarajan, Amit P. Sheth, Selvam Velmuru...
HUC
2004
Springer
14 years 3 months ago
Rapid Authoring of Mediascapes
Ubiquitous computing promises to enable new classes of application. In this paper, we present research intended to accelerate the exploration of the space of possible application ...
Richard Hull 0002, Ben J. C. Clayton, Tom Melamed
JCS
2007
103views more  JCS 2007»
13 years 9 months ago
Risk management for distributed authorization
Distributed authorization takes into account several elements, including certificates that may be provided by non-local actors. While most trust management systems treat all asse...
Christian Skalka, Xiaoyang Sean Wang, Peter C. Cha...