Sciweavers

6844 search results - page 1208 / 1369
» Web Service Security
Sort
View
170
Voted
SIGMOD
2012
ACM
220views Database» more  SIGMOD 2012»
13 years 6 months ago
GUPT: privacy preserving data analysis made easy
It is often highly valuable for organizations to have their data analyzed by external agents. However, any program that computes on potentially sensitive data risks leaking inform...
Prashanth Mohan, Abhradeep Thakurta, Elaine Shi, D...
146
Voted
WWW
2005
ACM
16 years 4 months ago
Analysis of multimedia workloads with implications for internet streaming
In this paper, we study the media workload collected from a large number of commercial Web sites hosted by a major ISP and that collected from a large group of home users connecte...
Lei Guo, Songqing Chen, Zhen Xiao, Xiaodong Zhang
CIKM
2007
Springer
15 years 10 months ago
A volcano erupts: semantically mediated integration of heterogeneous volcanic and atmospheric data
We present a research effort into the application of semantic web methods and technologies to address the challenging problem of integrating heterogeneous volcanic and atmospheri...
Peter Fox, Deborah L. McGuinness, Robert Raskin, A...
ICDE
2006
IEEE
159views Database» more  ICDE 2006»
15 years 10 months ago
Replication Based on Objects Load under a Content Distribution Network
Users tend to use the Internet for “resource-hungry” applications (which involve content such as video, audio on-demand and distributed data) and at the same time, more and mo...
George Pallis, Konstantinos Stamos, Athena Vakali,...
W4A
2006
ACM
15 years 9 months ago
Evaluating interfaces for intelligent mobile search
Recent developments in the mobile phone market have led to a significant increase in the number of users accessing the Mobile Internet. Handsets have been improved to support a d...
Karen Church, Barry Smyth, Mark T. Keane
« Prev « First page 1208 / 1369 Last » Next »