Search results
Create the page "Data privacy" on this wiki! See also the search results found.
Page title matches
- 26 bytes (2 words) - 13:40, 3 September 2017
Page text matches
- |Title=The 10th International Conference on Mobile Data Mangement (MDM'09): Systems, Services and Middleware in mobile data management. The conference provides unique opportunities for researchers,13 KB (1,468 words) - 01:23, 22 August 2008
- Data management constitutes the essential enabling technology for several diverse purposes. Established data management solutions9 KB (1,189 words) - 14:53, 28 August 2008
- ...articular requirements. On the one hand, there are aspects of programming, data handling, and intensive computing applications; on the other hand, there ar ...networks to exist; within groups and between groups there are problems of privacy, identity, anonymity, trust, and confidentiality. Additionally, conflict, d18 KB (2,408 words) - 02:37, 16 December 2008
- ...Twelfth International Conference on Advances in Databases, Knowledge, and Data Applications |Field=data, software, automation11 KB (1,371 words) - 12:28, 18 May 2020
- ...substantial improvements for content processing, information indexing, and data, process and knowledge mining. The push came from Web services, artificial ...de facto’ methods to support new requirements in terms of scalability, privacy, performance, indexing, and heterogeneity of both content and technology.11 KB (1,446 words) - 18:26, 13 October 2008
- Research Data Management Data Repositories and Archives5 KB (624 words) - 10:32, 9 May 2019
- ...these contents comprise a wealth of information often involving multimedia data such as audio, video, pictures and blogs. Further, NTT DoCoMo i-Mode techno * Data models and query languages5 KB (746 words) - 18:19, 13 October 2008
- * Security, Privacy and Trust * Distributed Database and Data Mining34 KB (4,565 words) - 22:20, 10 January 2018
- * Security, Privacy and Trust * Distributed Database and Data Mining8 KB (1,037 words) - 22:20, 10 January 2018
- * Security, Privacy and Trust * Distributed Database and Data Mining9 KB (1,189 words) - 22:20, 10 January 2018
- * Security, Privacy and Trust * Distributed Database and Data Mining26 KB (3,456 words) - 22:20, 10 January 2018
- ...tributions from many fields such as embedded systems, distributed systems, data management, system security and applications. The conference places emphasi * Security, Privacy & Trust4 KB (519 words) - 16:13, 14 October 2008
- * Security and privacy New tools for measurement and data collection8 KB (989 words) - 20:13, 22 February 2009
- * Data mining and knowledge discovery for MBC * RFID and sensor data management for MBC5 KB (647 words) - 22:05, 14 October 2008
- | Title = 1st International Workshop on Data and Process Provenance ...-produce experiments as well as to greatly assist in the interpretation of data-analyses outcomes. These are all crucial for knowledge discovery.3 KB (416 words) - 17:48, 14 October 2008
- ...re defined radio networks, wireless networks, sensor networks, or Internet data streaming and mining. Internet and data streaming/mining algorithms11 KB (1,385 words) - 17:48, 14 October 2008
- ...e: algorithms and data structures, computational complexity, cryptography, privacy, computational geometry, algorithmic graph theory and combinatorics, random6 KB (869 words) - 20:22, 22 February 2009
- data in a truly open way. The Second International Workshop on Location and sharing, privacy issues, and interface design issues. The goal is to create5 KB (753 words) - 22:01, 14 October 2008
- * Database applications and data mining * Trust, security and privacy19 KB (2,503 words) - 13:25, 28 October 2020
- * Security and privacy in vehicular networks * Architecture, algorithms and protocols for data dissemination in vehicular networks3 KB (378 words) - 14:22, 24 August 2016
- - Persistence support and integration of stored data in SPSs - Data mining and knowledge discovery in SPSs3 KB (490 words) - 20:05, 14 October 2008
- # Data Semantics and Linked Data Semantic Web data4 KB (450 words) - 20:05, 14 October 2008
- * › Mobile Agents Support for Data Networks * › Wireless Location Privacy Law and Policies9 KB (1,219 words) - 20:05, 14 October 2008
- Privacy, Trust, and Security is Distributed Systems Data Placement and Storage in Distributed and Mobile Environments2 KB (208 words) - 20:05, 14 October 2008
- ...rental Controls, Legal and Regulatory Issues, Data Collection, Biometrics, Privacy, Encryption3 KB (354 words) - 20:06, 14 October 2008
- - Data Security Issues - Patient Privacy and Confidentiality6 KB (780 words) - 20:06, 14 October 2008
- o Data Management and Data Centers o Security and Privacy2 KB (303 words) - 20:06, 14 October 2008
- * Data fusion in pervasive healthcare environments * Physiological models for interpreting medical sensor data6 KB (732 words) - 22:45, 14 October 2008
- * Data management and middleware support for collaborative information systems * Security an privacy in collaboration6 KB (674 words) - 22:45, 14 October 2008
- ...t provided a suitable model to collect, represent, process and manage such data. Current advances like the Contextualized Attention Metadata Schema (CAM) o ...ing, information retrieval, database systems, digital libraries, metadata, data mining, user modelling, social networks, psychology and cognitive science,6 KB (890 words) - 22:53, 14 October 2008
- semi-structured data; data mining; knowledge discovery; schema migration; digital libraries; data warehousing9 KB (1,193 words) - 22:53, 14 October 2008
- Coupling and Integrating Heterogeneous Data Sources Data Warehouses9 KB (1,240 words) - 22:56, 14 October 2008
- |Title=13th Pacific-Asia Conference on Knowledge Discovery and Data Mining |Field=Data mining2 KB (295 words) - 12:03, 18 October 2008
- - Data Mining - Privacy, safety and security18 KB (2,457 words) - 23:04, 14 October 2008
- ...ent repeatability of their experiments, and share with the community their data and test harnesses. Topics include, but are not limited to, the following. * Management of Semantic Web Data6 KB (854 words) - 12:05, 28 May 2016
- ...search and different scientific communities, such as Software Engineering, Data Bases, Distributed Systems, Information Systems, Information Retrieval, Ser - Data mining and data analysis6 KB (827 words) - 23:04, 14 October 2008
- visualization, personalization, privacy issues - Semantic Web. Meta data analysis and tagging, knowledge extraction,4 KB (468 words) - 23:07, 14 October 2008
- This results in, for example, tools whose algorithms and data structures are poorly primary data by means of standoff annotation. Closely related work deals with7 KB (957 words) - 23:08, 14 October 2008
- | Title = The Alberto Mendelzon Workshop on Foundations of Data Management THE ALBERTO MENDELZON WORKSHOP ON FOUNDATIONS OF DATA MANAGEMENT5 KB (660 words) - 14:52, 2 March 2012
- ...providing new insights in the specification, design, or implementation of data management tools are called for. ...data; security; semantic Web; semi-structured data; spatial data; temporal data; transactions; updates; views; Web services; workflows; XML.3 KB (457 words) - 13:09, 7 December 2016
- |Title=2009 ACM SIGMOD International Conference on Management of Data 2009 ACM SIGMOD International Conference on Management of Data7 KB (851 words) - 05:29, 15 October 2008
- * Data mining/knowledge discovery. * Data warehousing.2 KB (308 words) - 23:08, 14 October 2008
- Data Privacy and Security Data Warehousing, Data Cubes, and7 KB (1,006 words) - 23:08, 14 October 2008
- | Title = 14th International Conference on Management of Data areas but also adds emphasis on Web, Information Retrieval and Data Mining.5 KB (661 words) - 16:23, 11 December 2008
- | Title = The 8th IEEE International Conference on Data Mining | Field = Data mining5 KB (634 words) - 15:36, 14 December 2008
- |Title=ACM Eleventh International Workshop on Data Warehousing and OLAP ACM Eleventh International Workshop on Data Warehousing and OLAP10 KB (1,288 words) - 11:52, 18 October 2008
- | Title = The third Twente Data Management workshop on Privacy Aware Data Management557 bytes (65 words) - 23:09, 14 October 2008
- The term "data and information quality" denotes, in a broad sense, a set of properties of the data that indicate various types of error conditions.5 KB (658 words) - 23:09, 14 October 2008
- * Data quality, integration, warehousing and mining * Privacy and security issues3 KB (452 words) - 23:09, 14 October 2008
- * Data quality, semantics and integration * Data privacy and security6 KB (840 words) - 23:10, 14 October 2008
- ...ics, including traditional database management, as well new challenges for data management in any possible domain. Prospective authors are encouraged to co DATA WAREHOUSING AND KNOWLEDGE DISCOVERY3 KB (305 words) - 08:44, 31 July 2020
- integration of intelligence and data justifies its today's attractiveness. Since 1990 DEXA is an annual internat * Data and Information Modelling4 KB (457 words) - 16:14, 16 December 2020
- stronger over the years as data management research marched through many a data model, with logic keeping up and providing the foundations every step5 KB (647 words) - 23:10, 14 October 2008
- | Title = 3rd Workshop on Data Storage Devices and Systems DS2 2008, the 3rd International Workshop on Data Storage Devices and Systems, will be held at the University of Perugia, Per4 KB (539 words) - 23:10, 14 October 2008
- The theme of BNCOD 2008, the 25th in the series, is "Sharing Data, Information and Knowledge". * Data integration and interoperability4 KB (593 words) - 23:10, 14 October 2008
- * Scientific data management in all domains, e.g. environmental health, biology, genomics, Ea ...* Conceptual models, data models, knowledge representation of scientific data3 KB (350 words) - 23:10, 14 October 2008
- | Title = International Workshop on Privacy and Anonymity in the Information Society Attacks against De-identified Data2 KB (193 words) - 23:10, 14 October 2008
- ...y. Our belief is that XML is the main means towards this new generation of data management systems. Following the experience of previous editions of DataX * Interchange and integration of XML data3 KB (475 words) - 23:10, 14 October 2008
- ...es (and vice versa), to network monitoring systems that depend on advanced data management and analysis capabilities�?? suggests a blurring of the bounda * Data models, query models, and query languages for networking3 KB (332 words) - 23:10, 14 October 2008
- | Title = International Workshop on RFID Data Management International Workshop on RFID Data Management4 KB (471 words) - 23:10, 14 October 2008
- | Title = 3rd Int. Workshop on Dependability Aspects on Data WArehousing and Mining Applications tremendous opportunities for data sharing, integration, and analysis7 KB (908 words) - 23:10, 14 October 2008
- |Title=1st Workshop on Data and Services Management in Mobile Environments ...nt techniques. Therefore, these techniques are evolving and leading to new data and services management systems that consider variable user capabilities an2 KB (324 words) - 16:49, 16 December 2020
- * Data mining and Pattern Recognition in e-learning * Security and privacy;4 KB (503 words) - 23:11, 14 October 2008
- |Title=Second ACM International Conference on Web Search and Data Mining The Second ACM International Conference on Web Search and Data Mining (WSDM) 20092 KB (237 words) - 12:23, 11 September 2020
- ...e of personal information for the networking operations raise entirely new privacy concerns and require new reflections on security problems. ...shop is to encompass research advances in all areas of security, trust and privacy in Opportunistic and Social Networks.4 KB (457 words) - 23:13, 14 October 2008
- * Technologies for Building and Operating Massive Web Services Data * Privacy-Preserving Web Services Technologies8 KB (1,158 words) - 23:14, 14 October 2008
- * Privacy / intimacy in the social Web * Social software in collaborative maintenance of content and data7 KB (860 words) - 11:55, 7 January 2009
- * Data management and middleware support for collaborative information systems * Security, privacy and trust management in collaborative networks, systems, and applications8 KB (1,093 words) - 23:15, 14 October 2008
- 3-03 Distributed data and knowledge based systems 3-10 Database applications and data mining5 KB (623 words) - 23:15, 14 October 2008
- ...lex, involving difficult social and policy issues such as those related to privacy and security likely in those areas where the right data in the right time have mission-critical importance.8 KB (1,003 words) - 23:15, 14 October 2008
- ...applications, service-oriented computing, middleware, networking, agents, data management and services, all with special focus on mobility and ubiquitous * Security, privacy and social issues of mobile and ubiquitous systems5 KB (599 words) - 23:15, 14 October 2008
- ...in different aspects of the field, ranging from accuracy and robustness to data security and user interface. o Fusion schemes/Data quality estimation/Qualitative-based fusion4 KB (526 words) - 23:17, 14 October 2008
- + Data Management for e-Business TRACK - Data and knowledge engineering for e-Business5 KB (594 words) - 16:29, 25 March 2020
- | Field = Data mining the 25th International Conference on Data Engineering ICDE'09,5 KB (592 words) - 23:18, 14 October 2008
- |Title=The Ninth SIAM International Conference on Data Mining |Field=Data mining4 KB (520 words) - 20:02, 26 February 2020
- | Field = Data mining ...uch as user modeling, machine learning, intelligent information retrieval, data and text mining, statistics, computational intelligence, human-computer int4 KB (570 words) - 23:19, 14 October 2008
- | Title = The 2nd International Workshop on Domain Driven Data Mining | Field = Data mining4 KB (510 words) - 23:19, 14 October 2008
- data mining. Unlike in traditional data mining scenarios, data does not emerge from a small number of (heterogeneous) data sources, but virtually5 KB (646 words) - 23:19, 14 October 2008
- | Title = Practical Privacy - Preserving Data Mining | Field = Data mining5 KB (721 words) - 23:19, 14 October 2008
- applied cryptography intrusion detection data and application security database security privacy-enhancing technology security in IT outsourcing5 KB (637 words) - 23:20, 14 October 2008
- Confidentiality, Data and system integrity Privacy, contract agreements, and payment systems4 KB (502 words) - 23:20, 14 October 2008
- Due to constant changing environments, limited battery life and diverse data types, Mobile - Database and Data Management Mobile Computing10 KB (1,262 words) - 23:20, 14 October 2008
- - Distributed Database and Data Mining - Security, Privacy and Trust3 KB (357 words) - 23:23, 14 October 2008
- * sensor design and data acquisition Biometric Security and Privacy3 KB (325 words) - 23:50, 14 October 2008
- ...cation and networking, embedded systems and hardware, distributed systems, data management, and applications, so we welcome cross-disciplinary work. Data, information, and signal processing6 KB (771 words) - 16:09, 16 September 2019
- * Tools and Methodologies for Large Scale Semantic Web Data - Management Trust, Provenance, Security, Privacy, Identity and the Semantic Web4 KB (573 words) - 23:31, 14 October 2008
- Semantic Annotation of Data Semantic Web Trust, Privacy, Security and Intellectual Property Rights2 KB (266 words) - 11:46, 28 May 2016
- * Online social networks: privacy, reputation, content sharing, search * Cloud computing and data center networks4 KB (577 words) - 23:31, 14 October 2008
- ...application specific fixed function, programmable, reconfigurable, near- data and in-memory accelerators, etc. * Architectural support for security, side-channel attacks and mitigation, privacy preserving computation, IoT/Cloud/Cyber-Physical-System security, security5 KB (580 words) - 10:32, 12 May 2020
- * Algorithms and data structures, * Theoretical aspects of areas such as networks, privacy, information retrieval, computational biology, and databases.2 KB (283 words) - 18:05, 4 March 2021
- *Big Data platforms with applications to network management, security, measurements *Innovative uses of network data beyond communication4 KB (514 words) - 12:03, 6 April 2020
- ...cation of internet technologies, multimedia, wireless communications, data privacy and security, authentification, authorization and federation.4 KB (504 words) - 23:33, 14 October 2008
- | Title = The First International Conference on Security and Privacy in Mobile Information and Communication Systems ...ers from academia and industry in the field of mobile systems security and privacy, as well as practitioners, standards developers and policymakers.4 KB (451 words) - 23:37, 14 October 2008
- ...e: algorithms and data structures, computational complexity, cryptography, privacy, computational geometry, algorithmic graph theory and combinatorics, random5 KB (766 words) - 23:37, 14 October 2008
- information system is to balance the autonomy of networked data, Agent-based distributed data mining.9 KB (1,215 words) - 23:38, 14 October 2008
- ...describing significant research contributions to thefield of computer and data communication networks. We invite submissions on network architecture, desi * Security, trust, & privacy3 KB (380 words) - 19:34, 17 November 2008
- ...n integrated approaches for assuring reliability, availability, integrity, privacy, confidentiality, safety, and real-time of complex systems and the methods * Policies for reliability, safety, security, integrity, privacy, and confidentiality of high assurance systems6 KB (748 words) - 14:43, 27 December 2015
- - Knowledge discovery and data mining, link analysis, Web mining - Internet search, UCC management, online ...ersonal information management, data integration and federation, security, privacy2 KB (303 words) - 23:42, 14 October 2008
- |title=IEEE Transactions on Big Data |Field=Big Data927 bytes (139 words) - 05:14, 9 September 2023
- ...hitectures and formalisms; Security and design vulnerability; Security and privacy protection; Performance and security; Secure group communication/multicast; ...egrity; Information flow protection; Trustworthy networks: authentication, privacy and security models; Secure service discovery; Secure location-based servic13 KB (1,617 words) - 19:03, 24 November 2008
- .../autonomic, on-demand, cloud/etc./; Context-aware and context recognition; Data-centers and nano-centers; Information processing /distribution, discovery, ...otocol translation; IP simplified network management; Security, trust, and privacy; Network stability under topology change; Delay-tolerant IP networks; Trust7 KB (883 words) - 17:35, 7 January 2021
- *Geometric and topological data analysis *Learning with system constraints: e.g. privacy, memory or communication budget3 KB (314 words) - 09:33, 1 April 2020
- data, analysis, decision and execution. As such, real time service-oriented * Security and privacy for RTSOAA based CPS7 KB (922 words) - 00:58, 9 January 2009
- ** Privacy and security ** Inter/intra government applications data exchange11 KB (1,366 words) - 16:44, 14 January 2009
- The Data Grid and Pervasive Computing Data and knowledge management for Pervasive Computing4 KB (597 words) - 13:46, 23 January 2009
- o Databases and data mining * Security, Privacy, Encryption, and Digital Rights, including9 KB (1,221 words) - 12:58, 18 January 2009
- - Data modeling - Privacy5 KB (633 words) - 12:58, 18 January 2009
- * Privacy * Data mining16 KB (2,178 words) - 12:59, 18 January 2009
- ...ethical issues, such as those pertaining to information security, privacy, data mining, and intellectual property. Therefore, as e-business continues to gr ...ent issues in e-business such as those of privacy, information management, data mining, intellectual property, and consumer tracking.6 KB (856 words) - 13:00, 18 January 2009
- ...cessing play a key role in the context of a plethora of modern distributed data, information and knowledge management applications and systems. Distributed - Distributed XML Data Management7 KB (1,030 words) - 13:00, 18 January 2009
- * Stochastic Aspects of Data Hiding * Privacy, trust accountability and dependability6 KB (687 words) - 13:00, 18 January 2009
- | Title = 11th International Conference on Data Warehousing and Knowledge Discovery 11th International Conference on Data Warehousing and Knowledge Discovery (DaWaK 2009),7 KB (1,006 words) - 13:00, 18 January 2009
- - temporal data models and query languages - temporal data mining6 KB (872 words) - 13:00, 18 January 2009
- * Data hiding in biometrics, security issues of biometrics, biometric * Practical systems exhibiting data hiding characteristics.3 KB (303 words) - 17:06, 24 February 2016
- | Title = Special Issue of Electronic Commerce Research Journal on Trust and Privacy Aspects of Electronic Commerce Privacy Aspects of Electronic Commerce5 KB (602 words) - 13:44, 23 January 2009
- * High data rate transmission systems * Wireless security and privacy14 KB (1,518 words) - 13:01, 18 January 2009
- and parallel and distributed data storage technologies. NAS 2009 will * Security, trust, and privacy10 KB (1,206 words) - 13:01, 18 January 2009
- - Data Mining 7) Data Storage Devices and Systems - DSDS 0910 KB (1,321 words) - 13:01, 18 January 2009
- • Security, Ethics and Privacy • Data Mining and Knowledge Discovery in HI4 KB (528 words) - 13:01, 18 January 2009
- numbers of diverse but interrelated data sources of many varying forms. these disparate data sources, so that they can co-exist comfortably and4 KB (568 words) - 13:01, 18 January 2009
- - Data mining advances on the discovery and analysis of communities - Security, privacy, trust and safety of cyber physical & social computing3 KB (446 words) - 13:02, 18 January 2009
- | Title = 4th Workshop on Data Storage Devices and Systems DS2 2009, the 4th International Workshop on Data Storage Devices and Systems, will be held at the Kyung Hee University, Yong4 KB (532 words) - 15:04, 27 December 2015
- ...ecurity risks in ubiquitous resource sharing, which could be occurred when data resources are connected and accessed by anyone in UC. Therefore, security i - Data privacy and trustiness6 KB (852 words) - 13:02, 18 January 2009
- + Middleware solutions for Security, Privacy and Trust service, and data access service6 KB (800 words) - 22:11, 27 February 2009
- systems that cooperate to exchange data. These systems have emerged as the * Security and privacy in P2P systems5 KB (623 words) - 17:06, 27 February 2009
- * Data Types and Query Languages * Data Stream Technologies4 KB (534 words) - 17:07, 27 February 2009
- _ Data Governance _ Data Scrubbing and Cleaning5 KB (690 words) - 17:07, 27 February 2009
- * Aggregation techniques and data management * Privacy and security services6 KB (861 words) - 17:07, 27 February 2009
- ...ves. In this context analysing concepts like Trust, Reliability, Security, Privacy and Risk would help the users to make informed judgements of what their lev • Security and Privacy4 KB (600 words) - 17:07, 27 February 2009
- ...RFID, GSM, GPRS, 3G Digital Pens, PDAs, Mobile Phones, VoIP, Video, Voice, Data, other devices) for improvement of our human lives, not just organizations, Security and Privacy7 KB (941 words) - 17:07, 27 February 2009
- * Authorization, Privacy and Security * Data Mining and Knowledge Discovery9 KB (1,249 words) - 08:42, 7 October 2011
- • Data and Knowledge Engineering for E-Business • Security and Privacy in E-Commerce3 KB (319 words) - 17:07, 27 February 2009
- * Security, data handling, and privacy * Spontaneous integration of public/private data & devices5 KB (670 words) - 17:08, 27 February 2009
- privacy, resilience, availability and manageability, and the ability to -Databases and Data Mining11 KB (1,440 words) - 17:08, 27 February 2009
- | Title = 2009 World Congress on Privacy, Security, Trust and the Management of e-Business 2009 World Congress on Privacy, Security, Trust and the Management of e-Business12 KB (1,690 words) - 17:08, 27 February 2009
- - data integrity - data and application security6 KB (828 words) - 17:08, 27 February 2009
- ...has been tightly intertwined with the collection of identifiable personal data. It is the time for researchers in this field to get together and think abo - Data acquisition and process5 KB (711 words) - 17:08, 27 February 2009
- .... Paradigms and algorithms for information visualization, personalization, privacy issue * Semantic Web. Meta data analysis and tagging, knowledge extraction, inference, and maintenance3 KB (400 words) - 21:02, 27 February 2009
- * Data-centric issues, including anonymization, querying, and storage ...nally identifiable information, and etiquette for using shared measurement data (see Allman and Paxson, IMC '07). If applicable, authors are also urged to6 KB (774 words) - 17:08, 27 February 2009
- Security and Privacy in Wired, Wireless, Mobile, Sensor Ad Hoc Networks Computer Networks and Data Communication, QoS and Traffic Analysis5 KB (578 words) - 10:21, 20 November 2020
- - XML and data management - Web Security and Privacy3 KB (440 words) - 15:25, 9 December 2009
- - Data mining applications for WMC - Security, privacy, and cryptographic protocols for WMC3 KB (477 words) - 16:54, 8 August 2009
- | Title = International Conference on Management of Data | Field = Data mining4 KB (553 words) - 11:33, 2 August 2009
- ...rs such as the different tags assigned to the same Web. Second, social Web data cover a vast number of heterogeneous entities and distinct feature represen - Exploitation of unannotated social Web data4 KB (525 words) - 11:34, 2 August 2009
- XML and Data Management Web Security and Privacy4 KB (564 words) - 12:01, 6 November 2020
- | Title = 11th International Conference on Mobile Data Management ...though substantial research has been conducted, several areas in mobile data management remain ripe with open research challenges.5 KB (530 words) - 11:34, 2 August 2009
- Security and Privacy in Wired, Wireless, Mobile, Sensor Ad Hoc Networks Computer Networks and Data Communication, QoS and Traffic Analysis5 KB (599 words) - 10:21, 20 November 2020
- ...hitectures and formalisms; Security and design vulnerability; Security and privacy protection; Performance and security; Secure group communication/multicast; ...egrity; Information flow protection; Trustworthy networks: authentication, privacy and security models; Secure service discovery; Secure location-based servic6 KB (746 words) - 11:35, 2 August 2009
- ...or deployments. Thus, the traditional study of QoS in transporting sensory data in pervasive systems ought to be balanced with the study of QoI in deliveri - Energy-efficient data fusion, sensor fault analysis, sensor data cleansing5 KB (734 words) - 11:35, 2 August 2009
- | Title = International Workshop on Data Mining for Biomarker Discovery | Field = Data mining5 KB (670 words) - 11:35, 2 August 2009
- ? Data management issues ? Security and privacy5 KB (571 words) - 11:35, 2 August 2009
- ...ul interception; Multi-modal undesired traffic detection; Measurements and data mining correlation; Countermeasures on undesired traffic ...of plane tickets; Platforms for electronic distribution of hotel booking; Data accuracy; E-trade strengths and weaknesses; Malicious spyware; Blocking wit14 KB (1,651 words) - 15:56, 15 February 2017
- * Coupling and Integrating Heterogeneous Data Sources * Data Warehouses5 KB (552 words) - 17:06, 12 August 2009
- - Visual Data Analysis and Knowledge Discovery - Data Acquisition and Information Processing2 KB (245 words) - 18:52, 7 January 2010
- - Security and Privacy in Wired, Wireless, Mobile, Sensor Ad Hoc Networks - Computer Networks and Data Communication, QoS and Traffic Analysis5 KB (667 words) - 14:27, 13 September 2009
- - Data mining and knowledge discovery in distributed environments - Intelligent integration of data and processes4 KB (508 words) - 13:29, 13 July 2010
- *Intelligent data management - Data Mining4 KB (507 words) - 22:37, 18 November 2009
- * Data mining security * Trust, privacy, and data security5 KB (607 words) - 18:01, 3 December 2009
- ...lity. Verification and validation. E-business agents. Pervasive computing. Privacy, safety, and security. Andrzej Skowron (Discovery of processes and their interactions from data and domain knowledge),6 KB (733 words) - 18:19, 24 September 2020
- ...ive sensing networks, higher processing power, and the ability to transfer data more quickly through both wired and wireless systems. Thus, particularly dr ...ld only make adequate value if patients’ data is treated in a secure and privacy-sensitive way.6 KB (889 words) - 13:48, 26 February 2010
- |Title=EIGHTH INTERNATIONAL CONFERENCE on PRIVACY, SECURITY, and TRUST |Field=Privacy, Security, and Trust4 KB (484 words) - 14:20, 14 December 2009
- |Title=7th International Conference on TRUST, PRIVACY AND SECURITY IN DIGITAL BUSINESS TRUST, PRIVACY AND SECURITY IN DIGITAL BUSINESS (TrustBus´10)7 KB (982 words) - 19:13, 3 January 2010
- - Data mining applications for WMC - Security, privacy, and cryptographic protocols for WMC3 KB (497 words) - 03:43, 28 February 2010
- |Title=5th International Conference on Software and Data Technologies Conference name: 5th International Conference on Software and Data Technologies(ICSOFT)3 KB (392 words) - 13:50, 30 April 2020
- • Big data analytics for cybersecurity<br> '''Data Science and Analytics in Security Informatics:'''4 KB (429 words) - 08:55, 1 August 2019
- *Big data analytics for cybersecurity '''Data Science and Analytics in Security Informatics:'''9 KB (1,092 words) - 09:35, 1 August 2019
- ...ur that can resists malicious attack, low quality information and preserve privacy. ...mmendation and trust systems, personalization techniques, users models and data mining in the field of social search, user analysis and understanding. Part6 KB (765 words) - 14:01, 11 April 2010
- ...es including statistics, databases, pattern recognition, machine learning, data visualization, optimization, and high-performance computing, to deliver adv ...th gathering relevant information from unstructured and semantically fuzzy data in texts and other media, searching for information within documents and fo3 KB (451 words) - 19:25, 16 February 2010
- ...el of noise, represented by non-pertinent, untrustworthy or even malicious data. Trust and Recommender systems, along with personalization techniques, appe ...y pattern-matching trust concept into logs, by implicit techniques such as data mining or machine learning. This workshop focuses on discussing and identif4 KB (600 words) - 19:11, 18 February 2010
- - Security, encryption and privacy for vehicular systems - Data dissemination and delay-tolerant networking techniques for VCS5 KB (624 words) - 21:14, 4 March 2010
- * › Data Mining * › Privacy, safety and security4 KB (418 words) - 14:18, 10 March 2010
- * Data Security * Privacy2 KB (217 words) - 16:50, 19 November 2020
- * › XML and data management * › Web Security and Privacy5 KB (627 words) - 12:33, 16 June 2010
- |Field=systems and network telemetry, Machine learning, data science, High-performance computing, Distributed systems ...ntax and semantics, which makes organizing and incorporating the generated data difficult for extensive analysis.4 KB (584 words) - 17:42, 13 March 2020
- *Sensor data storage, retrieval, processing *Security and privacy3 KB (412 words) - 09:52, 27 February 2020
- ...revenue maximization; pricing; fair division; computational social choice; privacy and ethics. ...ction markets; recommender, reputation and trust systems; social learning; data markets.5 KB (718 words) - 12:00, 11 September 2020
- ...revenue maximization; pricing; fair division; computational social choice; privacy and ethics. ...ction markets; recommender, reputation and trust systems; social learning; data markets.3 KB (330 words) - 13:12, 27 February 2020
- ...patibility, prediction markets, recommender, reputation and trust systems, privacy ...ND SYSTEMS, including: machine learning, automated agents, trading agents, data mining, experience with e-commerce and systems, economics of the Cloud, soc3 KB (316 words) - 14:07, 27 February 2020
- * › Coupling and Integrating Heterogeneous Data Sources * › Data Warehouses19 KB (2,462 words) - 19:10, 26 August 2010
- ...your internet email account as a way for sending out and getting back fax data. If you happen to be new to these service providers and might be worried ab ...ve internet connection. Now you shouldn’t worry about having to lose the privacy of your sensitive documents. It may be very affordable when being compared3 KB (610 words) - 16:33, 27 August 2010
- * Data Structures * Foundations of Privacy, Trust and Reputation in Network4 KB (602 words) - 06:44, 26 August 2020
- ...grammers, and others interested in the latest advances in the security and privacy of computer systems and networks. The 29th USENIX Security Symposium will b ...ns are solicited in all areas relating to systems research in security and privacy, including but not limited to:3 KB (343 words) - 16:31, 6 May 2020
- * Application of AI and big data in IS * Data and business analytics3 KB (395 words) - 15:14, 24 September 2020
- *Intelligent data management - Data Mining6 KB (732 words) - 05:52, 5 December 2010
- ...or the sharing of ideas about the meaning and implications of security and privacy, particularly those with important consequences for the technical community • Public key cryptography and key management • Confidentiality, privacy, integrity, authenticatio5 KB (609 words) - 17:01, 5 July 2020
- Security, Ethics and Privacy Data Mining and Knowledge Discovery in HI5 KB (693 words) - 10:44, 14 November 2010
- * Data Security * Privacy2 KB (217 words) - 16:57, 27 December 2015
- and of the privacy and integrity of the user model data, both of which are the user’s data is very important, since it determines the user’s acceptance6 KB (880 words) - 13:14, 1 February 2011
- * Data Mining * Privacy, Safety and Security4 KB (439 words) - 17:54, 29 June 2011
- XML and data management Web Security and Privacy5 KB (612 words) - 12:07, 1 July 2011
- ...ew threats accompany these trends as well, though. Social hacking, lost of privacy, vague or complex copy rights are just one of them. *Data Mining in Social Networks5 KB (669 words) - 14:40, 20 December 2011
- ...e-Business, e-Science, Green Computing, Secured Technologies, Intelligent Data Management *Intelligent data management5 KB (595 words) - 05:03, 15 January 2012
- - Security, Privacy and Trust - Data- and compute- intensive applications6 KB (745 words) - 15:27, 1 November 2016
- ...ng and trust in the system's functioning and the way it manages the user's data is very important, since it determines the user's acceptance of the applica - Models and mechanisms for privacy7 KB (975 words) - 06:13, 18 February 2012
- ...re systems, standardization of technologies and procedures, certification, privacy are some of the issues that medical informatics professionals and the ICT i Confidentiality and Data Security in Healthcare9 KB (1,186 words) - 17:44, 24 February 2012
- ...s; Cooperative data exchange; Energy efficient-contention protocols; Named data networking; Adaptive contention window; Network mobility models; Spectrum a ...ds; Smart and sustainable cities; Public data centers; Traffic profiles in data centers; Smart energy; Car Connectivity; Green communications systems13 KB (1,580 words) - 19:35, 18 February 2021
- ...grids or industrial systems has become real but also emphasizes particular privacy and security issues to be overcome, especially when interconnected with Int ...ire not only revisiting existing solutions (e.g., for intrusion detection, privacy preserving, and resilience against attacks), but also designing novel secur4 KB (581 words) - 18:48, 24 February 2020
- '''2020 Theme: Data and knowledge for the next generation: sustainability, transparency and fai ...y situated to highlight technologies and insights that materialize the big data and artificial intelligence vision of the future.5 KB (653 words) - 13:04, 3 August 2023
- *Big data *Cloud data management4 KB (535 words) - 21:32, 11 February 2020
- *Big data *Probabilistic and uncertain data4 KB (500 words) - 17:29, 6 January 2021
- ...cience, Free University of Bozen-Bolzano, Research Centre on Knowledge and Data (KRDB) *Trust and privacy in knowledge representation5 KB (579 words) - 13:18, 17 February 2020
- '''Data/Object Management''' *Data Semantics and Integrity Constraints5 KB (663 words) - 11:49, 18 February 2020
- ...|| Education || Parallel, distributed, and concurrent systems || Security, privacy and trust | Big data || End-user software engineering || Program comprehension || Software model6 KB (738 words) - 11:21, 6 July 2020
- * Web Semantics & Linked (Open) Data * Enterprise Knowledge Graphs, Graph Data Management and Deep Semantics6 KB (872 words) - 14:00, 22 February 2020
- * Linked Data and Semantic Data Integration * Trust, Privacy, and Security for Knowledge Graphs4 KB (531 words) - 14:14, 22 February 2020
- |Title=ACM International Conference on Web Search and Data Mining |Field=Information retrieval, Data mining4 KB (508 words) - 15:49, 14 May 2020
- * Search in Structured Data (e.g., XML search, graph search, ranking in databases, desktop search, emai ...o user-centric aspects of IR including user interfaces, behavior modeling, privacy, interactive systems, such as:8 KB (1,024 words) - 09:57, 13 May 2020
- *Cloud computing and data centers *Design and analysis of concurrent and distributed data structures2 KB (299 words) - 11:51, 8 April 2020
- *Web Big Data and Web data analytics *Semantic Web and Linked Open Data applications7 KB (991 words) - 11:15, 12 July 2019
- * Linked Data * Big Data and semantics, exchange and integration5 KB (663 words) - 14:34, 5 December 2018
- * Linked Data * Big Data and semantics, exchange and integration5 KB (699 words) - 14:57, 5 December 2018
- Visual Data Analysis and Knowledge Discovery Data Acquisition and Information Processing4 KB (466 words) - 16:27, 19 June 2012
- ...Sensor Networks Software and Architectures, Wireless Information Networks, Data Manipulation, Signal Processing, Localization and Object Tracking through S 4. DATA MANIPULATION5 KB (600 words) - 14:41, 20 June 2012
- *Big data analytics for cybersecurity<br> '''Data Science and Analytics in Security Informatics:'''5 KB (575 words) - 10:16, 1 August 2019
- Data mining/Text mining/Web mining • Geographical data mining6 KB (728 words) - 01:01, 25 August 2012
- |Acronym=DATA 2013 |Title=2nd International Conference on Data Management Technologies and Applications5 KB (558 words) - 13:27, 27 November 2020
- ICSOFT 2013 will be held in conjunction with DATA 2013 and SIMULTECH 2013 Registration to ICSOFT allows free access to the DATA and SIMULTECH conferences (as a non-speaker)6 KB (801 words) - 11:04, 14 April 2020
- but also more subjects will be discussed at the conference such as Data Privacy, Cryptology, Information Security, E-Governance Security, Public Key3 KB (351 words) - 09:52, 28 October 2012
- ...enough for digital transformation, but are also responsible by considering privacy, security, and ethical concerns and providing trustworthiness. * Big data application in IS3 KB (375 words) - 15:06, 24 September 2020
- data engineering researchers, practitioners, developers, * Big Data and Advanced Analytics5 KB (584 words) - 14:44, 14 January 2013
- *Intelligent data management - Data Mining4 KB (535 words) - 14:38, 17 January 2013
- - Data and Metadata Communications Technologies - Cyber-identities and privacy5 KB (702 words) - 10:02, 5 March 2013
- ...Sensor Networks Software and Architectures, Wireless Information Networks, Data Manipulation, Signal Processing, Localization and Object Tracking through S 4. DATA MANIPULATION5 KB (647 words) - 19:06, 5 April 2013
- • Privacy, safety and security • Data Mining4 KB (438 words) - 14:04, 8 May 2013
- where "content" may be anything including structured data, video, - Data and web mining5 KB (609 words) - 11:08, 26 July 2016
- * Privacy & Data Protection * Security and Privacy of the Internet of Things [https://www.acsac.org/2016/cfp/hardtopic/ Hard T2 KB (264 words) - 15:32, 7 January 2021
- ** Reasoning over Semantic Web data ** Lightweight semantics (linked data, microformats, etc.)5 KB (711 words) - 19:02, 7 March 2020
- ...TELLIGENCE AND BIG DATA ANALYTICS: Soft computing, knowledge discovery and data mining, machine learning, computational biology, agent-based systems, seman ...d computing, mobile and ubiquitous computing, big data systems, security & privacy.3 KB (422 words) - 12:09, 24 April 2016
- |Title=1st International Conference on Security and Privacy in Vehicular Networks |Field=Security and Privacy in Vehicular Networks2 KB (233 words) - 06:32, 20 September 2016
- ...discussing research results and directions in the areas related to Linked Data, knowledge representation and reasoning, and semantic technologies. Its aim Scalable Data Access6 KB (898 words) - 14:42, 24 September 2016
- ...the domain of Web, information systems, data analytics, and knowledge and data engineering. The decision on acceptance/rejection of workshop proposals wil * Big Data Techniques and Applications2 KB (230 words) - 00:37, 28 May 2016
- |Title=16th IEEE International Conference on Data Mining |Field=Data mining2 KB (239 words) - 15:26, 26 February 2020
- ...is includes change management, trend detection, model evolution, streaming data and stream reasoning, event processing, time-and space dependent models, co * Mining the Semantic Web and the Web of Data8 KB (1,067 words) - 12:26, 7 July 2018
- * Data Warehousing, Data Mining, and Big Data * Social Networks, Web, and Personal Data Management4 KB (464 words) - 11:38, 4 September 2020
- - Cloud Computing and Big Data Analytics - Data Integration and Data Provenance12 KB (1,565 words) - 04:15, 5 August 2023
- * Privacy and Confidentiality * Big Data and Data Mining870 bytes (100 words) - 18:53, 2 March 2021
- * Big Data Analytics * Security and Privacy Issues925 bytes (116 words) - 11:05, 24 August 2016
- |Field=data mining, network, mechanisms&methods Trends in mining/retrieving/handling data10 KB (1,305 words) - 00:29, 12 December 2020
- * Big Data * Security and Privacy of Information and IS3 KB (434 words) - 10:28, 26 July 2016
- |Title=15th IEEE International Conference on Data Mining |Field=Data mining2 KB (242 words) - 15:26, 26 February 2020
- ...ntext awareness, mobile computing, search engines, question answering, big data, multimedia, and services. * Structured data5 KB (580 words) - 20:22, 28 January 2017
- |Title=13th IEEE International Conference on Data Mining |Field=Data mining3 KB (407 words) - 10:17, 27 July 2016
- |Title=22nd ACM SIGKDD Conference on Knowledge Discovery and Data Mining |Field=Data mining2 KB (282 words) - 10:48, 8 February 2020
- |Title=21st ACM SIGKDD Conference on Knowledge Discovery and Data Mining |Field=Data mining2 KB (270 words) - 10:49, 8 February 2020
- *Intelligent data management - Data Mining5 KB (641 words) - 22:32, 29 July 2016
- ...data management is relevant to this symposium. Contributions that connect data management to other areas of theoretical computer science, and those which * graph databases and (semantic) Web data4 KB (557 words) - 10:14, 15 May 2019
- * Data Warehousing, Data Mining, and Big Data * Social Networks, Web, and Personal Data Management3 KB (340 words) - 11:27, 4 September 2020
- ...e transference of methods between both domains. The theme this year is big data and software engineering & knowledge engineering. Submission of papers and * Data modeling, mining and data analytics18 KB (2,288 words) - 12:48, 27 October 2016
- ...search, content management, knowledge management, recommendation systems, data integration, etc.). [BLINK] Benchmarking Linked Data10 KB (1,424 words) - 09:54, 6 March 2020
- Big and Smart Data * Linked (Open) Data9 KB (1,190 words) - 10:12, 5 June 2019