Sciweavers

110 search results - page 7 / 22
» Turning Teenagers into Stores
Sort
View
ACSAC
2007
IEEE
15 years 3 months ago
The Design and Development of an Undercover Multipurpose Anti-spoofing Kit (UnMask)
This paper describes the design and development of a software system to support law enforcement in investigating and prosecuting email based crimes. It focuses on phishing scams w...
Sudhir Aggarwal, Jasbinder Bali, Zhenhai Duan, Leo...
EOR
2007
96views more  EOR 2007»
14 years 9 months ago
A fast method for discovering critical edge sequences in e-commerce catalogs
Web sites allow the collection of vast amounts of navigational data – clickstreams of user traversals through the site. These massive data stores offer the tantalizing possibil...
Kaushik Dutta, Debra E. VanderMeer, Anindya Datta,...
CAD
2005
Springer
14 years 9 months ago
Efficiency of boundary evaluation for a cellular model
Feature modeling systems usually employ a boundary representation (b-rep) to store the shape information on a product. It has, however, been shown that a b-rep has a number of sho...
Rafael Bidarra, Joaquim Madeira, Willem J. Neels, ...
GVD
2009
108views Database» more  GVD 2009»
14 years 7 months ago
Privacy Challenges for Database Systems
Over the last years the means to collect personal data implicitly or explicitly over the Web and by various kinds of sensors and to combine data for profiling individuals has dram...
Johann Christoph Freytag

Publication
311views
16 years 9 months ago
Towards Privacy-Aware Location-Based Database Servers
The wide spread of location-based services results in a strong market for location-detection devices (e.g., GPS-like devices, RFIDs, handheld devices, and cellular phones). Example...
Mohamed F. Mokbel