Sciweavers

549 search results - page 88 / 110
» Belief-Based Risk Analysis
Sort
View
WWW
2010
ACM
15 years 5 months ago
Privacy in dynamic social networks
Recent work on anonymizing online social networks (OSNs) has looked at privacy preserving techniques for publishing a single instance of the network. However, OSNs evolve and a si...
Smriti Bhagat, Graham Cormode, Balachander Krishna...
HICSS
2003
IEEE
142views Biometrics» more  HICSS 2003»
15 years 5 months ago
Blackout Mitigation Assessment in Power Transmission Systems
Electric power transmission systems are a key infrastructure and blackouts of these systems have major direct and indirect consequences on the economy and national security. Analy...
Benjamin A. Carreras, Vickie E. Lynch, David E. Ne...
HICSS
2003
IEEE
99views Biometrics» more  HICSS 2003»
15 years 5 months ago
Financial Model-Base Construction for Flexible Model Manipulation of Models and Solvers
As financial markets are volatile and rapidly changing, preciseness and agility in price evaluation and risk assessment in the portfolios are more important and decision support s...
Keun-Woo Lee, Soon-Young Huh
WACV
2002
IEEE
15 years 4 months ago
Viewing Enhancement in Video-Endoscopy
Video-endoscopy (Figure 1), a mode of minimally invasive surgery, has proven to be significantly less invasive to the patient. However, it creates a much more complex operation env...
Dan Koppel, Yuan-Fang Wang, Hua Lee
MDM
2010
Springer
301views Communications» more  MDM 2010»
15 years 4 months ago
Query m-Invariance: Preventing Query Disclosures in Continuous Location-Based Services
Abstract—Location obfuscation using cloaking regions preserves location anonymity by hiding the true user among a set of other equally likely users. Furthermore, a cloaking regio...
Rinku Dewri, Indrakshi Ray, Indrajit Ray, Darrell ...