Sciweavers

2257 search results - page 59 / 452
» Information accountability
Sort
View
CCS
2009
ACM
15 years 6 months ago
A metadata calculus for secure information sharing
In both commercial and defense sectors a compelling need is emerging for rapid, yet secure, dissemination of information to the concerned actors. Traditional approaches to informa...
Mudhakar Srivatsa, Dakshi Agrawal, Steffen Reidt
WWW
2009
ACM
16 years 16 days ago
A measurement-driven analysis of information propagation in the flickr social network
Online social networking sites like MySpace, Facebook, and Flickr have become a popular way to share and disseminate content. Their massive popularity has led to viral marketing t...
Meeyoung Cha, Alan Mislove, P. Krishna Gummadi
SP
2010
IEEE
210views Security Privacy» more  SP 2010»
15 years 3 months ago
Reconciling Belief and Vulnerability in Information Flow
Abstract—Belief and vulnerability have been proposed recently to quantify information flow in security systems. Both concepts stand as alternatives to the traditional approaches...
Sardaouna Hamadou, Vladimiro Sassone, Catuscia Pal...
ICIP
2007
IEEE
14 years 12 months ago
Information-Based Color Feature Representation for Image Classification
1 For the image classification task, the color histogram is widely used as an important color feature indicating the content of the image. However, the high-resolution color histog...
Shi-Lin Wang, Alan Wee-Chung Liew
WWW
2007
ACM
16 years 16 days ago
Explorations in the use of semantic web technologies for product information management
Master data refers to core business entities a company uses repeatedly across many business processes and systems (such as lists or hierarchies of customers, suppliers, accounts, ...
Chen Wang, Daniel C. Wolfson, Jean-Sébastie...