Search results

Jump to: navigation, search
  • | Title = 3rd Int. Workshop on Dependability Aspects on Data WArehousing and Mining Applications tremendous opportunities for data sharing, integration, and analysis
    7 KB (908 words) - 23:10, 14 October 2008
  • |Title=1st Workshop on Data and Services Management in Mobile Environments ...nt techniques. Therefore, these techniques are evolving and leading to new data and services management systems that consider variable user capabilities an
    2 KB (324 words) - 16:49, 16 December 2020
  • * Data mining and Pattern Recognition in e-learning * Security and privacy;
    4 KB (503 words) - 23:11, 14 October 2008
  • |Title=Second ACM International Conference on Web Search and Data Mining The Second ACM International Conference on Web Search and Data Mining (WSDM) 2009
    2 KB (237 words) - 12:23, 11 September 2020
  • ...e of personal information for the networking operations raise entirely new privacy concerns and require new reflections on security problems. ...shop is to encompass research advances in all areas of security, trust and privacy in Opportunistic and Social Networks.
    4 KB (457 words) - 23:13, 14 October 2008
  • * Technologies for Building and Operating Massive Web Services Data * Privacy-Preserving Web Services Technologies
    8 KB (1,158 words) - 23:14, 14 October 2008
  • * Privacy / intimacy in the social Web * Social software in collaborative maintenance of content and data
    7 KB (860 words) - 11:55, 7 January 2009
  • * Data management and middleware support for collaborative information systems * Security, privacy and trust management in collaborative networks, systems, and applications
    8 KB (1,093 words) - 23:15, 14 October 2008
  • 3-03 Distributed data and knowledge based systems 3-10 Database applications and data mining
    5 KB (623 words) - 23:15, 14 October 2008
  • ...lex, involving difficult social and policy issues such as those related to privacy and security likely in those areas where the right data in the right time have mission-critical importance.
    8 KB (1,003 words) - 23:15, 14 October 2008
  • ...applications, service-oriented computing, middleware, networking, agents, data management and services, all with special focus on mobility and ubiquitous * Security, privacy and social issues of mobile and ubiquitous systems
    5 KB (599 words) - 23:15, 14 October 2008
  • ...in different aspects of the field, ranging from accuracy and robustness to data security and user interface. o Fusion schemes/Data quality estimation/Qualitative-based fusion
    4 KB (526 words) - 23:17, 14 October 2008
  • + Data Management for e-Business TRACK - Data and knowledge engineering for e-Business
    5 KB (594 words) - 16:29, 25 March 2020
  • | Field = Data mining the 25th International Conference on Data Engineering ICDE'09,
    5 KB (592 words) - 23:18, 14 October 2008
  • |Title=The Ninth SIAM International Conference on Data Mining |Field=Data mining
    4 KB (520 words) - 20:02, 26 February 2020
  • | Field = Data mining ...uch as user modeling, machine learning, intelligent information retrieval, data and text mining, statistics, computational intelligence, human-computer int
    4 KB (570 words) - 23:19, 14 October 2008
  • | Title = The 2nd International Workshop on Domain Driven Data Mining | Field = Data mining
    4 KB (510 words) - 23:19, 14 October 2008
  • data mining. Unlike in traditional data mining scenarios, data does not emerge from a small number of (heterogeneous) data sources, but virtually
    5 KB (646 words) - 23:19, 14 October 2008
  • | Title = Practical Privacy - Preserving Data Mining | Field = Data mining
    5 KB (721 words) - 23:19, 14 October 2008
  • applied cryptography intrusion detection data and application security database security privacy-enhancing technology security in IT outsourcing
    5 KB (637 words) - 23:20, 14 October 2008

View (previous 20 | next 20) (20 | 50 | 100 | 250 | 500)