Sciweavers

1347 search results - page 229 / 270
» Towards a Secure Data Stream Management System
Sort
View
CIKM
2009
Springer
16 years 22 hour ago
Privacy-enhanced public view for social graphs
We consider the problem of releasing a limited public view of a sensitive graph which reveals at least k edges per node. We are motivated by Facebook’s public search listings, w...
Hyoungshick Kim, Joseph Bonneau
SWAP
2007
15 years 6 months ago
Some Experiments on the Usage of a Deductive Database for RDFS Querying and Reasoning
Abstract. Ontologies are pervading many areas of knowledge representation and management. To date, most research efforts have been spent on the development of sufficiently express...
Giovambattista Ianni, Alessandra Martello, Claudio...
TVCG
2011
146views more  TVCG 2011»
15 years 11 days ago
Visibility Histograms and Visibility-Driven Transfer Functions
—Direct volume rendering is an important tool for visualizing complex data sets. However, in the process of generating 2D images from 3D data, information is lost in the form of ...
Carlos D. Correa, Kwan-Liu Ma
VEE
2005
ACM
130views Virtualization» more  VEE 2005»
15 years 11 months ago
The entropia virtual machine for desktop grids
Desktop distributed computing allows companies to exploit the idle cycles on pervasive desktop PC systems to increase the available computing power by orders of magnitude (10x - 1...
Brad Calder, Andrew A. Chien, Ju Wang, Don Yang
CIDM
2009
IEEE
16 years 6 days ago
Mining for insider threats in business transactions and processes
—Protecting and securing sensitive information are critical challenges for businesses. Deliberate and intended actions such as malicious exploitation, theft or destruction of dat...
William Eberle, Lawrence B. Holder