Sciweavers

2257 search results - page 81 / 452
» Information accountability
Sort
View
DASFAA
2009
IEEE
118views Database» more  DASFAA 2009»
15 years 29 days ago
Detecting Aggregate Incongruities in XML
The problem of identifying deviating patterns in XML repositories has important applications in data cleaning, fraud detection, and stock market analysis. Current methods determine...
Wynne Hsu, Qiangfeng Peter Lau, Mong-Li Lee
IRMA
2000
15 years 1 months ago
EMC - A modeling method for developing web-based applications
Early information systems were mainly built around secondary, administrative processes of the value chain (e.g. accounting). But since the internet came into use, more and more pr...
Peter Rittgen
ICDE
2008
IEEE
150views Database» more  ICDE 2008»
16 years 1 months ago
Link Privacy in Social Networks
We consider a privacy threat to a social network in which the goal of an attacker is to obtain knowledge of a significant fraction of the links in the network. We formalize the ty...
Aleksandra Korolova, Rajeev Motwani, Shubha U. Nab...
ICASSP
2009
IEEE
14 years 9 months ago
Phoneme cluster based state mapping for text-independent voice conversion
This paper takes phonetic information into account for data alignment in text-independent voice conversion. Hidden Markov Models are used for representing the phonetic structure o...
Meng Zhang, Jiaohua Tao, Jani Nurminen, Jilei Tian...
CHI
2010
ACM
15 years 6 months ago
On reconstruction of task context after interruption
Theoretical accounts of task resumption after interruption have almost exclusively argued for resumption as a primarily memory-based process. In contrast, for many task domains, r...
Dario D. Salvucci