Search results
Create the page "Data privacy" on this wiki! See also the search results found.
- | Title = 3rd Int. Workshop on Dependability Aspects on Data WArehousing and Mining Applications tremendous opportunities for data sharing, integration, and analysis7 KB (908 words) - 23:10, 14 October 2008
- |Title=1st Workshop on Data and Services Management in Mobile Environments ...nt techniques. Therefore, these techniques are evolving and leading to new data and services management systems that consider variable user capabilities an2 KB (324 words) - 16:49, 16 December 2020
- * Data mining and Pattern Recognition in e-learning * Security and privacy;4 KB (503 words) - 23:11, 14 October 2008
- |Title=Second ACM International Conference on Web Search and Data Mining The Second ACM International Conference on Web Search and Data Mining (WSDM) 20092 KB (237 words) - 12:23, 11 September 2020
- ...e of personal information for the networking operations raise entirely new privacy concerns and require new reflections on security problems. ...shop is to encompass research advances in all areas of security, trust and privacy in Opportunistic and Social Networks.4 KB (457 words) - 23:13, 14 October 2008
- * Technologies for Building and Operating Massive Web Services Data * Privacy-Preserving Web Services Technologies8 KB (1,158 words) - 23:14, 14 October 2008
- * Privacy / intimacy in the social Web * Social software in collaborative maintenance of content and data7 KB (860 words) - 11:55, 7 January 2009
- * Data management and middleware support for collaborative information systems * Security, privacy and trust management in collaborative networks, systems, and applications8 KB (1,093 words) - 23:15, 14 October 2008
- 3-03 Distributed data and knowledge based systems 3-10 Database applications and data mining5 KB (623 words) - 23:15, 14 October 2008
- ...lex, involving difficult social and policy issues such as those related to privacy and security likely in those areas where the right data in the right time have mission-critical importance.8 KB (1,003 words) - 23:15, 14 October 2008
- ...applications, service-oriented computing, middleware, networking, agents, data management and services, all with special focus on mobility and ubiquitous * Security, privacy and social issues of mobile and ubiquitous systems5 KB (599 words) - 23:15, 14 October 2008
- ...in different aspects of the field, ranging from accuracy and robustness to data security and user interface. o Fusion schemes/Data quality estimation/Qualitative-based fusion4 KB (526 words) - 23:17, 14 October 2008
- + Data Management for e-Business TRACK - Data and knowledge engineering for e-Business5 KB (594 words) - 16:29, 25 March 2020
- | Field = Data mining the 25th International Conference on Data Engineering ICDE'09,5 KB (592 words) - 23:18, 14 October 2008
- |Title=The Ninth SIAM International Conference on Data Mining |Field=Data mining4 KB (520 words) - 20:02, 26 February 2020
- | Field = Data mining ...uch as user modeling, machine learning, intelligent information retrieval, data and text mining, statistics, computational intelligence, human-computer int4 KB (570 words) - 23:19, 14 October 2008
- | Title = The 2nd International Workshop on Domain Driven Data Mining | Field = Data mining4 KB (510 words) - 23:19, 14 October 2008
- data mining. Unlike in traditional data mining scenarios, data does not emerge from a small number of (heterogeneous) data sources, but virtually5 KB (646 words) - 23:19, 14 October 2008
- | Title = Practical Privacy - Preserving Data Mining | Field = Data mining5 KB (721 words) - 23:19, 14 October 2008
- applied cryptography intrusion detection data and application security database security privacy-enhancing technology security in IT outsourcing5 KB (637 words) - 23:20, 14 October 2008