Sciweavers

947 search results - page 169 / 190
» Information Security in Mobile Databases
Sort
View
ER
2008
Springer
136views Database» more  ER 2008»
15 years 1 months ago
Automating the Extraction of Rights and Obligations for Regulatory Compliance
Abstract. Government regulations are increasingly affecting the security, privacy and governance of information systems in the United States, Europe and elsewhere. Consequently, co...
Nadzeya Kiyavitskaya, Nicola Zeni, Travis D. Breau...
ACMSE
2005
ACM
15 years 5 months ago
On developing a simple in-house digital library archive
Digital libraries (DLs) have become a major focus of information technology resources for organizations from academia, to the US Department of Defense to the archeological efforts...
Eric L. Brown, Luis G. Velazco, G. Kirksey, S. Ram...
85
Voted
PSD
2010
Springer
154views Database» more  PSD 2010»
14 years 10 months ago
Coprivacy: Towards a Theory of Sustainable Privacy
We introduce the novel concept of coprivacy or co-operative privacy to make privacy preservation attractive. A protocol is coprivate if the best option for a player to preserve her...
Josep Domingo-Ferrer
CVPR
2008
IEEE
16 years 1 months ago
Estimating age, gender, and identity using first name priors
Recognizing people in images is one of the foremost challenges in computer vision. It is important to remember that consumer photography has a highly social aspect. The photograph...
Andrew C. Gallagher, Tsuhan Chen
CHI
2005
ACM
16 years 5 days ago
What's in your wallet?: implications for global e-wallet design
As part of a comparative ethnographic study of everyday life of young professionals in London, Los Angeles, and Tokyo, we conducted a detailed survey of wallets and their contents...
Scott D. Mainwaring, Ken Anderson, Michele F. Chan...