Sciweavers

2608 search results - page 199 / 522
» Issue Management
Sort
View
139
Voted
KDD
2004
ACM
137views Data Mining» more  KDD 2004»
16 years 4 months ago
When do data mining results violate privacy?
Privacy-preserving data mining has concentrated on obtaining valid results when the input data is private. An extreme example is Secure Multiparty Computation-based methods, where...
Murat Kantarcioglu, Jiashun Jin, Chris Clifton
120
Voted
ICIW
2009
IEEE
15 years 10 months ago
BOF4WSS: A Business-Oriented Framework for Enhancing Web Services Security for e-Business
When considering Web services’ (WS) use for online business-to-business (B2B) collaboration between companies, security is a complicated and very topical issue. This is especial...
Jason R. C. Nurse, Jane Sinclair
139
Voted
CLUSTER
2008
IEEE
15 years 10 months ago
Enabling lock-free concurrent fine-grain access to massive distributed data: Application to supernovae detection
—We consider the problem of efficiently managing massive data in a large-scale distributed environment. We consider data strings of size in the order of Terabytes, shared and ac...
Bogdan Nicolae, Gabriel Antoniu, Luc Bougé
IEEEARES
2008
IEEE
15 years 10 months ago
Risk as Dependability Metrics for the Evaluation of Business Solutions: A Model-driven Approach
The analysis of business solutions is one of critical issues in industry. Risk is one of the most preeminent and accepted metrics for the evaluation of business solutions. Not sur...
Yudistira Asnar, Rocco Moretti, Maurizio Sebastian...
138
Voted
BTW
2007
Springer
140views Database» more  BTW 2007»
15 years 10 months ago
SmurfPDMS: A Platform for Query Processing in Large-Scale PDMS
: As Peer Data Management Systems (PDMS) are a focus of current research, there are lots of approaches like query processing or routing issues that have to be evaluated. Since ther...
Katja Hose, Christian Lemke, Jana Quasebarth, Kai-...