Sciweavers

1662 search results - page 59 / 333
» Privately Finding Specifications
Sort
View
PODS
2005
ACM
96views Database» more  PODS 2005»
16 years 3 months ago
Privacy-enhancing k-anonymization of customer data
In order to protect individuals' privacy, the technique of kanonymization has been proposed to de-associate sensitive attributes from the corresponding identifiers. In this p...
Sheng Zhong, Zhiqiang Yang, Rebecca N. Wright
103
Voted
HICSS
2008
IEEE
168views Biometrics» more  HICSS 2008»
15 years 10 months ago
Current Practices in Field Force Automation: Decision Support and Information Management for the Field Force
In the past, field operations have mostly been a stepchild of information and communication technology (ICT) enabled organizational overhaul and process re-design. Recently, incre...
Gwen Trentham, Hans Jochen Scholl
IEEEARES
2007
IEEE
15 years 9 months ago
Towards Secure E-Elections in Turkey: Requirements and Principles
E-democracy is a necessity in this era of computers and information technology. E-voting is one of the most significant parts of e-democracy, which refers to the use of computers ...
Orhan Cetinkaya, Deniz Cetinkaya
112
Voted
HICSS
2002
IEEE
128views Biometrics» more  HICSS 2002»
15 years 8 months ago
Flexible Instructional Strategies for E-learning
This paper provides an overview on a German lighthouse research project called L3 in the area of e-learning systems that supply e-learning services via a virtual private network. ...
Michael Altenhofen, Joachim Schaper
140
Voted
EUROPAR
2009
Springer
15 years 7 months ago
Fast and Efficient Synchronization and Communication Collective Primitives for Dual Cell-Based Blades
The Cell Broadband Engine (Cell BE) is a heterogeneous multi-core processor specifically designed to exploit thread-level parallelism. Its memory model comprehends a common shared ...
Epifanio Gaona, Juan Fernández, Manuel E. A...