Sciweavers

1310 search results - page 240 / 262
» Modelling and Using Imperfect Context Information
Sort
View
106
Voted
EDBT
2012
ACM
225views Database» more  EDBT 2012»
13 years 2 days ago
Differentially private search log sanitization with optimal output utility
Web search logs contain extremely sensitive data, as evidenced by the recent AOL incident. However, storing and analyzing search logs can be very useful for many purposes (i.e. in...
Yuan Hong, Jaideep Vaidya, Haibing Lu, Mingrui Wu
DIM
2005
ACM
14 years 11 months ago
A delegation framework for federated identity management
Identity federation is a powerful scheme that links accounts of users maintained distinctly by different business partners. The concept of network identity is a driver for accele...
Hidehito Gomi, Makoto Hatakeyama, Shigeru Hosono, ...
TKDE
2002
91views more  TKDE 2002»
14 years 9 months ago
The EVE Approach: View Synchronization in Dynamic Distributed Environments
The construction and maintenance of data warehouses (views) in large-scale environments composed of numerous distributed and evolving information sources (ISs) such as the WWW has ...
Amy J. Lee, Anisoara Nica, Elke A. Rundensteiner
JUCS
2010
159views more  JUCS 2010»
14 years 4 months ago
Developing a Secure Mobile Grid System through a UML Extension
: The idea of developing software through systematic development processes to improve software quality is not new. Nevertheless, there are still many information systems such as th...
David G. Rosado, Eduardo Fernández-Medina, ...
SAC
2003
ACM
15 years 2 months ago
Design Time Support for Adaptive Behavior in Web Sites
Adaptive web sites are sites that automatically improve their internal organization and/or presentation by observing userbrowsing behavior. In this paper we argue that adaptive be...
Sven Casteleyn, Olga De Troyer, Saar Brockmans