Sciweavers

2454 search results - page 158 / 491
» Privacy in the Information and Communications Technologies
Sort
View
DAWAK
2006
Springer
15 years 5 months ago
Priority-Based k-Anonymity Accomplished by Weighted Generalisation Structures
Abstract. Biobanks are gaining in importance by storing large collections of patient's clinical data (e.g. disease history, laboratory parameters, diagnosis, life style) toget...
Konrad Stark, Johann Eder, Kurt Zatloukal
ELPUB
1999
ACM
15 years 6 months ago
Electronic Publications of Cultural Heritage: Global Challenges and Local Practices
The paper reviews information and communication technologies as new tools in cultural representation and knowledge management, addresses issues of persuasion and engagement with t...
Aukse Balcytiene
OOPSLA
2010
Springer
15 years 1 days ago
The Tower of Babel did not fail
Fred Brooks’ retelling of the biblical story of the Tower of Babel offers many insights into what makes building software difficult. The difficulty, according to common interp...
Paul Adamczyk, Munawar Hafiz
IEEEIAS
2007
IEEE
15 years 8 months ago
Protection of Mammograms Using Blind Steganography and Watermarking
As medical image databases are connected together through PACS, those medical images may suffer from security breaches if not protected. If a medical image is illegally obtained o...
Yue Li, Chang-Tsun Li, Chia-Hung Wei
ECIR
2007
Springer
15 years 3 months ago
Personalized Communities in a Distributed Recommender System
The amount of data exponentially increases in information systems and it becomes more and more difficult to extract the most relevant information within a very short time. Among ot...
Sylvain Castagnos, Anne Boyer