Sciweavers

487 search results - page 41 / 98
» Personal Information Management (PIM) for Intelligence Analy...
Sort
View
ICTAI
2009
IEEE
15 years 6 months ago
Preventing Unwanted Social Inferences with Classification Tree Analysis
A serious threat to user privacy in new mobile and web2.0 applications stems from ‘social inferences’. These unwanted inferences are related to the users’ identity, current ...
Sara Motahari, Sotirios G. Ziavras, Quentin Jones
GECCO
2009
Springer
131views Optimization» more  GECCO 2009»
14 years 9 months ago
A multi-objective approach to data sharing with privacy constraints and preference based objectives
Public data sharing is utilized in a number of businesses to facilitate the exchange of information. Privacy constraints are usually enforced to prevent unwanted inference of info...
Rinku Dewri, Darrell Whitley, Indrajit Ray, Indrak...
GECCO
2008
Springer
141views Optimization» more  GECCO 2008»
15 years 27 days ago
Managing team-based problem solving with symbiotic bid-based genetic programming
Bid-based Genetic Programming (GP) provides an elegant mechanism for facilitating cooperative problem decomposition without an a priori specification of the number of team member...
Peter Lichodzijewski, Malcolm I. Heywood
FLAIRS
2006
15 years 1 months ago
Epistemic Categorization for Analysis of Customer Complaints
We introduce the particular functionality of the Complaint Engine suite, the integrated complaint management component for mediating consumer disputes. We formulate the problem of...
Boris Galitsky, Anca Pascu
DAWAK
2008
Springer
15 years 1 months ago
UML-Based Modeling for What-If Analysis
In order to be able to evaluate beforehand the impact of a strategical or tactical move, decision makers need reliable previsional systems. What-if analysis satisfies this need by ...
Matteo Golfarelli, Stefano Rizzi