Sciweavers

880 search results - page 62 / 176
» Mobile data and transaction management
Sort
View
ICDE
2009
IEEE
124views Database» more  ICDE 2009»
15 years 6 months ago
An Architecture for Regulatory Compliant Database Management
— Spurred by financial scandals and privacy concerns, governments worldwide have moved to ensure confidence in digital records by regulating their retention and deletion. These...
Soumyadeb Mitra, Marianne Winslett, Richard T. Sno...
CIKM
2008
Springer
15 years 1 months ago
Exploiting context to detect sensitive information in call center conversations
Protecting sensitive information while preserving the shareability and usability of data is becoming increasingly important. In call-centers a lot of customer related sensitive in...
Tanveer A. Faruquie, Sumit Negi, Anup Chalamalla, ...
VLDB
2007
ACM
295views Database» more  VLDB 2007»
15 years 6 months ago
From Data Privacy to Location Privacy: Models and Algorithms
This tutorial presents the definition, the models and the techniques of location privacy from the data privacy perspective. By reviewing and revising the state of art research in ...
Ling Liu
WWW
2007
ACM
16 years 16 days ago
Mobile shopping assistant: integration of mobile applications and web services
The goal of this poster is to describe our implementation of a new architecture enabling efficient integration between mobile phone applications and Web Services. Using this archi...
Huaigu Wu, Yuri Natchetoi
KDD
2003
ACM
194views Data Mining» more  KDD 2003»
16 years 8 days ago
Finding recent frequent itemsets adaptively over online data streams
A data stream is a massive unbounded sequence of data elements continuously generated at a rapid rate. Consequently, the knowledge embedded in a data stream is more likely to be c...
Joong Hyuk Chang, Won Suk Lee