Sciweavers

71 search results - page 7 / 15
» Data protection in outsourcing scenarios: issues and directi...
Sort
View
CASCON
2006
109views Education» more  CASCON 2006»
15 years 1 months ago
Legal research topics within services sciences
The paper presents a study to define some of the most important legal topics that need to be included in the Services Sciences' research agenda. To analyze what sort of legal...
Olli Pitkänen
ECIS
2003
15 years 1 months ago
Meeting privacy obligations: the implications for information systems development
The European Union(EU) Data Protection (Privacy) Directive of 1995 (EUPD) and resulting legislation introduced by member states is designed to ensure that business activity is sub...
Reeva M. Lederman, Graeme G. Shanks, Martin R. Gib...
FITRAMEN
2008
15 years 1 months ago
High-Performance H.264/SVC Video Communications in 802.11e Ad Hoc Networks
This work focuses on improving the performance of video communications based on the recently developed H.264 Scalable Video Coding (SVC) standard over 802.11e wireless networks. Th...
Attilio Fiandrotti, Dario Gallucci, Enrico Masala,...
KDD
2008
ACM
175views Data Mining» more  KDD 2008»
16 years 2 days ago
Geocode Matching and Privacy Preservation
Geocoding is the process of matching addresses to geographic locations, such as latitudes and longitudes, or local census areas. In many applications, addresses are the key to geo-...
Peter Christen
VLDB
2006
ACM
122views Database» more  VLDB 2006»
15 years 12 months ago
A secure distributed framework for achieving k-anonymity
k-anonymity provides a measure of privacy protection by preventing re-identification of data to fewer than a group of k data items. While algorithms exist for producing k-anonymous...
Wei Jiang, Chris Clifton