Sciweavers

24529 search results - page 460 / 4906
» Computing on Authenticated Data
Sort
View
123
Voted
CHI
2011
ACM
14 years 8 months ago
Data type based security alert dialogs
Max-Emanuel Maurer, Alexander De Luca, Heinrich Hu...
150
Voted
EDOC
2011
IEEE
14 years 4 months ago
Compliance Domains: A Means to Model Data-Restrictions in Cloud Environments
Daniel Schleicher, Christoph Fehling, Stefan Grohe...
TSC
2008
112views more  TSC 2008»
15 years 4 months ago
A Privacy Preserving Repository for Data Integration across Data Sharing Services
Current data sharing and integration among various organizations require a central and trusted authority to collect data from all data sources and then integrate the collected data...
Stephen S. Yau, Yin Yin
KDD
2002
ACM
183views Data Mining» more  KDD 2002»
16 years 5 months ago
E-CAST: A Data Mining Algorithm for Gene Expression Data
Data clustering methods have been proven to be a successful data mining technique in the analysis of gene expression data. The Cluster affinity search technique (CAST) developed b...
Abdelghani Bellaachia, David Portnoy, Yidong Chen,...