Sciweavers

557 search results - page 68 / 112
» Two experiences designing for effective security
Sort
View
CIKM
2006
Springer
15 years 3 months ago
An integer programming approach for frequent itemset hiding
The rapid growth of transactional data brought, soon enough, into attention the need of its further exploitation. In this paper, we investigate the problem of securing sensitive k...
Aris Gkoulalas-Divanis, Vassilios S. Verykios
ER
2008
Springer
136views Database» more  ER 2008»
15 years 1 months ago
Automating the Extraction of Rights and Obligations for Regulatory Compliance
Abstract. Government regulations are increasingly affecting the security, privacy and governance of information systems in the United States, Europe and elsewhere. Consequently, co...
Nadzeya Kiyavitskaya, Nicola Zeni, Travis D. Breau...
112
Voted
CORR
2010
Springer
137views Education» more  CORR 2010»
14 years 9 months ago
Seamless Flow Migration on Smartphones without Network Support
This paper addresses the following question: Is it possible to migrate TCP/IP flows between different networks on modern mobile devices, without infrastructure support or protocol...
Ahmad Rahmati, Clayton Shepard, Chad Tossell, Ange...
TIM
2011
172views more  TIM 2011»
14 years 6 months ago
Selecting a Reference High Resolution for Fingerprint Recognition Using Minutiae and Pores
—High-resolution automated fingerprint recognition systems (AFRSs) offer higher security because they are able to make use of level-3 features, such as pores, that are not avail...
David Zhang, Feng Liu, Qijun Zhao, Guangming Lu, N...
ACMACE
2005
ACM
15 years 1 months ago
Interactive and enjoyable interface in museum
Exhibitions at a scientific museum are usually difficult for ordinary school pupils. To improve the issues of current explanation systems, we use Personal Data Assistant (PDA) dev...
Fusako Kusunoki, Takako Yamaguti, Takuichi Nishimu...