Sciweavers

1155 search results - page 82 / 231
» Trusting Data Quality in Cooperative Information Systems
Sort
View
ICIP
2008
IEEE
16 years 3 months ago
Managing privacy data in pervasive camera networks
Privacy protection of visual information is increasingly important as pervasive camera networks becomes more prevalent. The proposed scheme addresses the problem of preserving and...
Sen-Ching S. Cheung, Jithendra K. Paruchuri, Thinh...
126
Voted
WISEC
2010
ACM
15 years 1 months ago
Mobile user location-specific encryption (MULE): using your office as your password
Data breaches due to stolen laptops are a major problem. Solutions exist to secure sensitive files on laptops, but are rarely deployed because users view them as inconvenient. Thi...
Ahren Studer, Adrian Perrig
DEBU
2007
211views more  DEBU 2007»
15 years 1 months ago
Provenance in Databases: Past, Current, and Future
The need to understand and manage provenance arises in almost every scientific application. In many cases, information about provenance constitutes the proof of correctness of re...
Wang Chiew Tan
MWCN
2004
Springer
15 years 7 months ago
Collaboration Enforcement and Adaptive Data Redirection in Mobile Ad Hoc Networks Using Only First-Hand Experience
: In Mobile Ad Hoc Networks (MANETs), all participating hosts are obligated to route and forward data for others to guarantee the availability of network applications and services....
Ning Jiang, Kien A. Hua, Mounir A. Tantaoui
SIGIR
2005
ACM
15 years 7 months ago
When will information retrieval be "good enough"?
We describe a user study that examined the relationship between the quality of an Information Retrieval system and the effectiveness of its users in performing a task. The task i...
James Allan, Ben Carterette, Joshua Lewis