Sciweavers

1640 search results - page 100 / 328
» Deriving Private Information from Randomized Data
Sort
View
144
Voted
FGCS
2008
159views more  FGCS 2008»
15 years 3 months ago
Access control management for ubiquitous computing
The purpose of ubiquitous computing is anywhere and anytime access to information within computing infrastructures that is blended into a background and no longer be reminded. Thi...
Hua Wang, Yanchun Zhang, Jinli Cao
169
Voted
PODS
2008
ACM
174views Database» more  PODS 2008»
16 years 3 months ago
Epistemic privacy
We present a novel definition of privacy in the framework of offline (retroactive) database query auditing. Given information about the database, a description of sensitive data, ...
Alexandre V. Evfimievski, Ronald Fagin, David P. W...
117
Voted
AINA
2007
IEEE
15 years 10 months ago
Intrusion Detection for Encrypted Web Accesses
As various services are provided as web applications, attacks against web applications constitute a serious problem. Intrusion Detection Systems (IDSes) are one solution, however,...
Akira Yamada, Yutaka Miyake, Keisuke Takemori, Ahr...
143
Voted
DEXAW
2009
IEEE
139views Database» more  DEXAW 2009»
15 years 10 months ago
Improving Web Page Retrieval Using Search Context from Clicked Domain Names
Abstract—Search context is a crucial factor that helps to understand a user’s information need in ad-hoc Web page retrieval. A query log of a search engine contains rich inform...
Rongmei Li
CGA
1998
15 years 3 months ago
Principles for Information Visualization Spreadsheets
ns, with large, abstract, multidimensional data sets that are visually represented in multiple ways. We illustrate how spreadsheet techniques provide a structured, intuitive, and p...
Ed Huai-hsin Chi, John Riedl, Phillip Barry, Josep...