Sciweavers

252 search results - page 36 / 51
» The Protection Of Public Health Data - A Case Study
Sort
View
JSS
2007
67views more  JSS 2007»
13 years 7 months ago
TFRP: An efficient microaggregation algorithm for statistical disclosure control
Recently, the issue of Statistic Disclosure Control (SDC) has attracted much attention. SDC is a very important part of data security dealing with the protection of databases. Micr...
Chin-Chen Chang, Yu-Chiang Li, Wen-Hung Huang
HICSS
2007
IEEE
122views Biometrics» more  HICSS 2007»
14 years 2 months ago
Enterprise Information Architecture (EIA): Assessment of Current Practices in Malaysian Organizations
In this paper we described the findings based on a research study on current Enterprise Information Architecture (EIA) practices in Malaysian organizations. Ten organizations from...
Rafidah Abd. Razak, Zulkhairi Md. Dahalin, Rohaya ...
SECON
2008
IEEE
14 years 2 months ago
UDAE: Universal Data Access Engine for Sensor Networks
—We present the design and implementation of UDAE, a Universal Data Access Engine for wireless sensor networks. The UDAE allows developers to access data both locally and over th...
Krisakorn Rerkrai, Janne Riihijärvi, Petri M&...
EUROISI
2008
13 years 9 months ago
Homeland Security Data Mining Using Social Network Analysis
The tragic events of September 11th have caused drastic effects on many aspects of society. Academics in the fields of computational and information science have been called upon ...
Hsinchun Chen
HICSS
2010
IEEE
144views Biometrics» more  HICSS 2010»
14 years 2 months ago
Tweet, Tweet, Retweet: Conversational Aspects of Retweeting on Twitter
Twitter—a microblogging service that enables users to post messages (“tweets”) of up to 140 characters—supports a variety of communicative practices; participants use Twit...
Danah Boyd, Scott Golder, Gilad Lotan