Sciweavers

3451 search results - page 141 / 691
» Security of Backup Data
Sort
View
ISI
2008
Springer
15 years 4 months ago
Visual Analytics for Supporting Entity Relationship Discovery on Text Data
To conduct content analysis over text data, one may look out for important named objects and entities that refer to real world instances, synthesizing them into knowledge relevant ...
Hanbo Dai, Ee-Peng Lim, Hady Wirawan Lauw, HweeHwa...
ISI
2007
Springer
15 years 10 months ago
Making Sense of VAST Data
: We view the task of sensemaking in intelligence as that of abducing a story whose plot explains the current data and makes verifiable predictions about the future and the past. W...
Summer Adams, Ashok K. Goel
SDMW
2004
Springer
15 years 9 months ago
Using Secret Sharing for Searching in Encrypted Data
When outsourcing data to an untrusted database server, the data should be encrypted. When using thin clients or low-bandwidth networks it is best to perform most of the work at the...
Richard Brinkman, Jeroen Doumen, Willem Jonker
ISI
2008
Springer
15 years 3 months ago
Anomaly detection in high-dimensional network data streams: A case study
In this paper, we study the problem of anomaly detection in high-dimensional network streams. We have developed a new technique, called Stream Projected Ouliter deTector (SPOT), t...
Ji Zhang, Qigang Gao, Hai H. Wang
JCDL
2003
ACM
103views Education» more  JCDL 2003»
15 years 9 months ago
SCENS: A System for the Mediated Sharing of Sensitive Data
1 This paper introduces SCENS, a Secure Content Exchange Negotiation System suitable for the exchange of private digital data that reside in distributed digital repositories. SCENS...
Song Ye, Fillia Makedon, Tilmann Steinberg, Li She...