Sciweavers

1305 search results - page 212 / 261
» Inferring Privacy Information from Social Networks
Sort
View
102
Voted
ECIS
2001
15 years 3 months ago
Learning to value the Bardic tradition: Culture, communication and organisational knowledge
Recent work on organisational knowledge suggests that, in addition to cultivating the 'knowledge spiral', organisations need to focus on facilitating forms of 'know...
Mark Thompson 0002, Geoff Walsham
AEI
2007
119views more  AEI 2007»
15 years 2 months ago
Exploring the CSCW spectrum using process mining
Process mining techniques allow for extracting information from event logs. For example, the audit trails of a workflow management system or the transaction logs of an enterprise ...
Wil M. P. van der Aalst
AIR
2005
158views more  AIR 2005»
15 years 1 months ago
Review on Computational Trust and Reputation Models
The scientific research in the area of computational mechanisms for trust and reputation in virtual societies is a recent discipline oriented to increase the reliability and perfor...
Jordi Sabater, Carles Sierra
CIKM
2009
Springer
15 years 8 months ago
POkA: identifying pareto-optimal k-anonymous nodes in a domain hierarchy lattice
Data generalization is widely used to protect identities and prevent inference of sensitive information during the public release of microdata. The k-anonymity model has been exte...
Rinku Dewri, Indrajit Ray, Indrakshi Ray, Darrell ...
WWW
2008
ACM
16 years 2 months ago
Networked graphs: a declarative mechanism for SPARQL rules, SPARQL views and RDF data integration on the web
Easy reuse and integration of declaratively described information in a distributed setting is one of the main motivations for building the Semantic Web. Despite of this claim, reu...
Simon Schenk, Steffen Staab