Sciweavers

7839 search results - page 1219 / 1568
» What's there and what's not
Sort
View
PUC
2010
80views more  PUC 2010»
15 years 8 days ago
Mobile map interactions during a rendezvous: exploring the implications of automation
Abstract Location awareness can help facilitate a rendezvous of two or more persons. To further enhance the rendezvous experience, we conducted two complementary field studies to ...
David Dearman, Kori M. Inkpen, Khai N. Truong
86
Voted
PUC
2010
116views more  PUC 2010»
15 years 8 days ago
Requirements for mobile photoware
What is the future of digital imaging? Mobile imaging technologies have been changing rapidly and will continue to do so. We explore new developments in cameraphone photography wit...
Morgan Ames, Dean Eckles, Mor Naaman, Mirjana Spas...
98
Voted
PVLDB
2010
95views more  PVLDB 2010»
15 years 8 days ago
Small Domain Randomization: Same Privacy, More Utility
Random perturbation is a promising technique for privacy preserving data mining. It retains an original sensitive value with a certain probability and replaces it with a random va...
Rhonda Chaytor, Ke Wang
PVLDB
2010
99views more  PVLDB 2010»
15 years 8 days ago
Towards Certain Fixes with Editing Rules and Master Data
A variety of integrity constraints have been studied for data cleaning. While these constraints can detect the presence of errors, they fall short of guiding us to correct the err...
Wenfei Fan, Jianzhong Li, Shuai Ma, Nan Tang, Weny...
RAID
2010
Springer
15 years 8 days ago
A Data-Centric Approach to Insider Attack Detection in Database Systems
The insider threat against database management systems is a dangerous security problem. Authorized users may abuse legitimate privileges to masquerade as other users or to maliciou...
Sunu Mathew, Michalis Petropoulos, Hung Q. Ngo, Sh...
« Prev « First page 1219 / 1568 Last » Next »