Sciweavers

3205 search results - page 572 / 641
» Coordination Technologies for Managing Information System Ev...
Sort
View
SIGMOD
2007
ACM
172views Database» more  SIGMOD 2007»
15 years 12 months ago
Auditing disclosure by relevance ranking
Numerous widely publicized cases of theft and misuse of private information underscore the need for audit technology to identify the sources of unauthorized disclosure. We present...
Rakesh Agrawal, Alexandre V. Evfimievski, Jerry Ki...
ESORICS
2009
Springer
15 years 6 months ago
Privacy Preservation over Untrusted Mobile Networks
The proliferation of mobile devices has given rise to novel user-centric applications and services. In current mobile systems, users gain access to remote servers over mobile netwo...
Claudio Agostino Ardagna, Sushil Jajodia, Pierange...
CIKM
2009
Springer
15 years 6 months ago
Maximal metric margin partitioning for similarity search indexes
We propose a partitioning scheme for similarity search indexes that is called Maximal Metric Margin Partitioning (MMMP). MMMP divides the data on the basis of its distribution pat...
Hisashi Kurasawa, Daiji Fukagawa, Atsuhiro Takasu,...
QUACON
2009
Springer
15 years 6 months ago
A Context Quality Model to Support Transparent Reasoning with Uncertain Context
Much research on context quality in context-aware systems divides into two strands: (1) the qualitative identication of quality measures and (2) the use of uncertain reasoning tec...
Susan McKeever, Juan Ye, Lorcan Coyle, Simon Dobso...
SUM
2009
Springer
15 years 6 months ago
Modeling Unreliable Observations in Bayesian Networks by Credal Networks
Bayesian networks are probabilistic graphical models widely employed in AI for the implementation of knowledge-based systems. Standard inference algorithms can update the beliefs a...
Alessandro Antonucci, Alberto Piatti