Sciweavers

10670 search results - page 16 / 2134
» Required Information Release
Sort
View
QSIC
2005
IEEE
15 years 3 months ago
Systematic Incremental Development of Agent Systems, using Prometheus
This paper presents a mechanism for dividing an agent oriented application into the three IEEE defined scoping levels of essential, conditional and optional. This mechanism is ap...
Mikhail Perepletchikov, Lin Padgham
81
Voted
WOWMOM
2005
ACM
133views Multimedia» more  WOWMOM 2005»
15 years 3 months ago
A Statistical Matching Approach to Detect Privacy Violation for Trust-Based Collaborations
Distributed trust and reputation management mechanisms are often proposed as a means of providing assurance in dynamic and open environments by enabling principals to building up ...
Mohamed Ahmed, Daniele Quercia, Stephen Hailes
85
Voted
DMIN
2006
115views Data Mining» more  DMIN 2006»
14 years 10 months ago
Privacy Preserving in Clustering using Fuzzy Sets
Data mining techniques, in spite of their benefit in a wide range of applications have also raised threat to privacy and data security. This paper addresses the problem of preservi...
S. Srinivasa Rao 0002, K. V. S. V. N. Raju, P. Kus...
IEEECIT
2010
IEEE
14 years 8 months ago
Research and Practice of Experimental Teaching System for OPhone Technology Courses
—OPhone is an open source platform in intelligent terminal released by China Mobile. With the increase of various applications based on the platform, OPhone education is becoming...
Jiali Bian, Jian Kuang, Xiaojun Chen, Zhiwen Nie
SOCIALCOM
2010
14 years 7 months ago
q-Anon: Rethinking Anonymity for Social Networks
This paper proposes that social network data should be assumed public but treated private. Assuming this rather confusing requirement means that anonymity models such as kanonymity...
Aaron Beach, Mike Gartrell, Richard Han