Sciweavers

252 search results - page 28 / 51
» The Protection Of Public Health Data - A Case Study
Sort
View
EDBTW
2010
Springer
14 years 2 months ago
Toward a software development methodology for anonymity applications
There are some software applications especially in privacy protection domain which they need anonymity support. Therefore lots of methods and protocols have been presented so far ...
Marzieh Ispareh, Behrouz Tork Ladani, Shirin Shari...
ACMDIS
2004
ACM
14 years 1 months ago
Privacy risk models for designing privacy-sensitive ubiquitous computing systems
Privacy is a difficult design issue that is becoming increasingly important as we push into ubiquitous computing environments. While there is a fair amount of theoretical work on ...
Jason I. Hong, Jennifer D. Ng, Scott Lederer, Jame...
MEDINFO
2007
13 years 9 months ago
Text Categorization Models for Identifying Unproven Cancer Treatments on the Web
The nature of the internet as a non-peer-reviewed (and more generally largely unregulated) publication medium has allowed wide-spread promotion of inaccurate and unproven medical ...
Yin Aphinyanaphongs, Constantin F. Aliferis
VLDB
1994
ACM
126views Database» more  VLDB 1994»
13 years 11 months ago
Building a Laboratory Information System Around a C++-Based Object-Oriented DBMS
MapBase is a laboratory information system that has been supporting a high-throughput genome-mapping operation for the last three years. We chose to build MapBase around a C++-bas...
Nathan Goodman, Steve Rozen, Lincoln Stein
LWA
2008
13 years 9 months ago
Enhanced Services for Targeted Information Retrieval by Event Extraction and Data Mining
Where Information Retrieval (IR) and Text Categorization delivers a set of (ranked) documents according to a query, users of large document collections would rather like to receiv...
Felix Jungermann, Katharina Morik