Sciweavers

1906 search results - page 236 / 382
» Data Privacy
Sort
View
WPES
2006
ACM
15 years 10 months ago
A privacy-preserving interdomain audit framework
Recent trends in Internet computing have led to the popularization of many forms of virtual organizations. Examples include supply chain management, grid computing, and collaborat...
Adam J. Lee, Parisa Tabriz, Nikita Borisov
KDD
2003
ACM
161views Data Mining» more  KDD 2003»
16 years 4 months ago
Eliminating noisy information in Web pages for data mining
A commercial Web page typically contains many information blocks. Apart from the main content blocks, it usually has such blocks as navigation panels, copyright and privacy notice...
Lan Yi, Bing Liu, Xiaoli Li
IJSN
2010
148views more  IJSN 2010»
15 years 2 months ago
Authentication and secret search mechanisms for RFID-aware wireless sensor networks
: This paper investigates authentication and secure data retrieval issues in Radio-Frequency IDentification (RFID)-aware wireless sensor networks. We propose a network architecture...
Shih-I Huang, Shiuhpyng Shieh
CHI
2009
ACM
16 years 4 months ago
Can I borrow your phone?: understanding concerns when sharing mobile phones
Mobile phones are becoming increasingly personalized in terms of the data they store and the types of services they provide. At the same time, field studies have reported that the...
Amy K. Karlson, A. J. Bernheim Brush, Stuart E. Sc...
ICDE
2010
IEEE
217views Database» more  ICDE 2010»
15 years 11 months ago
Toward industrial-strength keyword search systems over relational data
– Keyword search (KWS) over relational data, where the answers are multiple tuples connected via joins, has received significant attention in the past decade. Numerous solutions ...
Akanksha Baid, Ian Rae, AnHai Doan, Jeffrey F. Nau...