Sciweavers

2454 search results - page 274 / 491
» Privacy in the Information and Communications Technologies
Sort
View
CSSE
2006
IEEE
15 years 1 months ago
Experimental analysis of a privacy-preserving scalar product protocol
The recent investigation of privacy-preserving data mining has been motivated by the growing concern about the privacy of individuals when their data is stored, aggregated, and mi...
Zhiqiang Yang, Rebecca N. Wright, Hiranmayee Subra...
WPES
2004
ACM
15 years 7 months ago
Private collaborative forecasting and benchmarking
Suppose a number of hospitals in a geographic area want to learn how their own heart-surgery unit is doing compared with the others in terms of mortality rates, subsequent complic...
Mikhail J. Atallah, Marina Bykova, Jiangtao Li, Ke...
152
Voted
AGIS
1998
169views more  AGIS 1998»
15 years 1 months ago
The Configuration and Implementation of a Hybrid 3-D GIS for Urban Data Management
With the development of modern cities, 3-D spatial information systems (SIS) are increasingly required for spatial planning, communication systems and other applications. The geom...
Xinhua Wang, Armin Gruen
JDCTA
2008
160views more  JDCTA 2008»
15 years 1 months ago
Classification of IT Governance Tools for Selecting the Suitable One in an Enterprise
The Information Technology (IT) governance arrangements refer to the patterns of authority for key IT activities in organizations, including IT infrastructure, IT use, and project...
Fatemeh NasserEslami, Mehdi Fasanghari, H. R. Khod...
WWW
2004
ACM
16 years 2 months ago
The web around the corner: augmenting the browser with gps
As programmable mobile devices (such as high-end cellular phones and Personal Digital Assistants) became widely adopted, users ask for Internet access on-the-road. While upcoming ...
Davide Carboni, Andrea Piras, Stefano Sanna, Sylva...