|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 590 occurrences of 434 keywords
|
|
|
Results
Found 2122 publication records. Showing 2122 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
143 | Yingjiu Li, Lingyu Wang 0001, Xiaoyang Sean Wang, Sushil Jajodia |
Auditing Interval-Based Inference. |
CAiSE |
2002 |
DBLP DOI BibTeX RDF |
|
132 | Hasan, Burkhard Stiller |
A Generic Model and Architecture for Automated Auditing. |
DSOM |
2005 |
DBLP DOI BibTeX RDF |
|
110 | Lei Zhang 0004, Sushil Jajodia, Alexander Brodsky 0001 |
Simulatable Binding: Beyond Simulatable Auditing. |
Secure Data Management |
2008 |
DBLP DOI BibTeX RDF |
|
101 | Wei Chen 0135, Jin-cheng Zhang, Yu-quan Jiang |
One Continuous Auditing Practice in China: Data-oriented Online Auditing(DOOA). |
I3E (2) |
2007 |
DBLP DOI BibTeX RDF |
|
99 | Haibing Lu, Yingjiu Li, Vijayalakshmi Atluri, Jaideep Vaidya |
An efficient online auditing approach to limit private data disclosure. |
EDBT |
2009 |
DBLP DOI BibTeX RDF |
|
89 | Rajeev Motwani 0001, Shubha U. Nabar, Dilys Thomas |
Auditing a Batch of SQL Queries. |
ICDE Workshops |
2007 |
DBLP DOI BibTeX RDF |
|
74 | Yiping Shen, T. C. Lam, Jyh-Charn Liu, Wei Zhao 0001 |
On the Confidential Auditing of Distributed Computing Systems. |
ICDCS |
2004 |
DBLP DOI BibTeX RDF |
commutative cryptography, secure distributed computing, cluster, authenticity, anonymity, Auditing |
74 | Yogesh Deshpande, Anupama Chandrarathna, Athula Ginige |
Web site auditing: first step towards re-engineering. |
SEKE |
2002 |
DBLP DOI BibTeX RDF |
web site auditing, web site evaluation, web site reengineering, web site, web development |
72 | Giovanni Vigna, Bryan Cassell, Dave Fayram |
An Intrusion Detection System for Aglets. |
Mobile Agents |
2002 |
DBLP DOI BibTeX RDF |
Security, Mobile Agents, Intrusion Detection, Auditing |
67 | Wentian Lu, Gerome Miklau |
Auditing a Database under Retention Restrictions. |
ICDE |
2009 |
DBLP DOI BibTeX RDF |
|
67 | Jeremy Lau, Matthew Arnold, Michael Hind, Brad Calder |
A Loop Correlation Technique to Improve Performance Auditing. |
PACT |
2007 |
DBLP DOI BibTeX RDF |
|
67 | Hasan, Burkhard Stiller |
AURIC: A Scalable and Highly Reusable SLA Compliance Auditing Framework. |
DSOM |
2007 |
DBLP DOI BibTeX RDF |
|
67 | Krishnaram Kenthapadi, Nina Mishra, Kobbi Nissim |
Simulatable auditing. |
PODS |
2005 |
DBLP DOI BibTeX RDF |
|
65 | Chun-Hsiu Yeh, Tsui-Ping Chang, Wei-Cheng Shen |
Developing the Continuous Assurance Embedded Continuous Audit Web Services. |
APSCC |
2008 |
DBLP DOI BibTeX RDF |
|
56 | Rajeev Motwani 0001, Shubha U. Nabar, Dilys Thomas |
Auditing SQL Queries. |
ICDE |
2008 |
DBLP DOI BibTeX RDF |
|
56 | Zhenghong Xiao, Changqin Huang, Fuyin Xu |
A Security Auditing Approach Based on Mobile Agent in Grid Environments. |
ICCSA (5) |
2006 |
DBLP DOI BibTeX RDF |
|
54 | Chun-Hsiu Yeh, Tsui-Ping Chang, Wei-Cheng Shen |
Developing Continuous Audit and Integrating Information Technology in E-business. |
APSCC |
2008 |
DBLP DOI BibTeX RDF |
|
52 | Li Yang 0001 |
Teaching database security and auditing. |
SIGCSE |
2009 |
DBLP DOI BibTeX RDF |
curriculum, auditing, database security |
52 | Shyam K. Gupta 0001, Vikram Goyal, Anand Gupta |
Precomputation of privacy policy parameters for auditing SQL queries. |
ICUIMC |
2008 |
DBLP DOI BibTeX RDF |
privacy violation detection, privacy, auditing, compliance, inference control, information disclosure |
52 | Gerardo Canfora, Bice Cavallo |
A Bayesian approach for on-line max and min auditing. |
PAIS |
2008 |
DBLP DOI BibTeX RDF |
Bayesian network, auditing, statistical database |
47 | Petra Wohlmacher, Peter Pharow |
Applications in Health Care using Public-Key Certificates and Attribute Certificates. |
ACSAC |
2000 |
DBLP DOI BibTeX RDF |
medical administrative data processing, health professional, health professional card, jurisdiction, advertizing, trust center, HARP, European Electronic Signature Directive, European Data Protection Directive, Internet, authenticity, integrity, digital signature, smart cards, smart card, public key cryptography, certification, certificates, confidentiality, health care, auditing, auditing, authorisation, authentication protocol, data protection, permissions, applet, trusted third party, public-key certificates, x.509, access rights, attribute certificates, state of the art, nonrepudiation, security token, security infrastructures |
47 | Thomas Verghese, Ying Zhou |
Domain translation using relational structure. |
HICSS (4) |
1995 |
DBLP DOI BibTeX RDF |
domain description, domain translation, multiple effect system task, knowledge-based translation, constrained descriptive language, common descriptive language, translation procedures, language syntax, mathematical notion, decision support systems, expert systems, expert systems, translation, auditing, auditing, business data processing, formal logic, first order predicate logic, relational structure, organizational decision support system |
45 | Vikram Goyal, Shyam K. Gupta 0001, Manish Singh, Anand Gupta |
Auditing Inference Based Disclosures in Dynamic Databases. |
Secure Data Management |
2008 |
DBLP DOI BibTeX RDF |
|
45 | Vikram Goyal, Shyam K. Gupta 0001, Anand Gupta |
A Unified Audit Expression Model for Auditing SQL Queries. (PDF / PS) |
DBSec |
2008 |
DBLP DOI BibTeX RDF |
|
45 | Igor Sfiligoi, Greg Quinn, Chris Green, Greg Thain |
Pilot job accounting and auditing in Open Science Grid. |
GRID |
2008 |
DBLP DOI BibTeX RDF |
|
45 | Susan J. Lincke |
Network security auditing as a community-based learning project. |
SIGCSE |
2007 |
DBLP DOI BibTeX RDF |
security, audit, service learning |
45 | Peirong Che, Zhaokun Bu, Rui Hou, Xinxing Shi |
Auditing Revenue Assurance Information Systems for Telecom Operators. |
CONFENIS (2) |
2007 |
DBLP DOI BibTeX RDF |
Revenue assurance information system, Business process, Audit, Telecom operators |
45 | Yin Pan |
Security auditing course development. |
SIGITE Conference |
2007 |
DBLP DOI BibTeX RDF |
security, IT education, curriculum development, IT audit |
45 | Yongzheng Wu, Roland H. C. Yap |
A User-level Framework for Auditing and Monitoring. |
ACSAC |
2005 |
DBLP DOI BibTeX RDF |
|
45 | Jon Heffley, Pascal Meunier |
Can Source Code Auditing Software Identify Common Vulnerabilities and Be Used to Evaluate Software Security? |
HICSS |
2004 |
DBLP DOI BibTeX RDF |
|
45 | Jon M. Kleinberg, Christos H. Papadimitriou, Prabhakar Raghavan |
Auditing Boolean Attributes. |
PODS |
2000 |
DBLP DOI BibTeX RDF |
|
43 | Chengliang Zhang, Martin Hirzel |
Online Phase-Adaptive Data Layout Selection. |
ECOOP |
2008 |
DBLP DOI BibTeX RDF |
|
43 | You Peng, Yanzhang Wang |
Research about Security Audit Platform in E-Government System. |
Web Intelligence/IAT Workshops |
2008 |
DBLP DOI BibTeX RDF |
|
43 | Leon Strous |
Audit of Information Systems: The Need for Cooperation. |
SOFSEM |
1998 |
DBLP DOI BibTeX RDF |
|
42 | Hakan Hacigümüs |
Middleware support for auditing service process flows. |
MW4SOC |
2006 |
DBLP DOI BibTeX RDF |
security, privacy, middleware, service oriented computing, auditing |
42 | George Din, Akihiro Hayakawa, Ina Schieferdecker, Peter H. Deussen |
An Auditing System for QoS-Enabled Networks. |
ICDCS Workshops |
2003 |
DBLP DOI BibTeX RDF |
TTCN3, QoS, Auditing, Online Testing, Policy-based Network Management |
40 | Chrysovalantis Gaganis, Fotios Pasiouras, Sailesh Tanna, Constantin Zopounidis |
Binary choice models for external auditors decisions in Asian banks. |
Oper. Res. |
2008 |
DBLP DOI BibTeX RDF |
Classification, Auditing, Bank |
40 | Yanjiang Yang, Yingjiu Li, Robert H. Deng |
New Paradigm of Inference Control with Trusted Computing. (PDF / PS) |
DBSec |
2007 |
DBLP DOI BibTeX RDF |
security protocol, trusted computing, auditing, Inference control |
40 | Brent J. Liu, Zheng Zhou 0002, H. K. Huang |
A HIPAA-Compliant Architecture for Securing Clinical Images. |
J. Digit. Imaging |
2006 |
DBLP DOI BibTeX RDF |
security, monitoring, auditing, HIPAA |
40 | Jeff Smith |
LabDisplay: bringing computer lab management into the new millennium. |
SIGUCCS |
2005 |
DBLP DOI BibTeX RDF |
ZENworks, iPrint, lab tools, labDisplay, student services, security, statistics, auditing, students, website, printing, software management, inventory, computer lab, labs, lab management, cost reduction, Novell |
34 | Yurdaer N. Doganata, Francisco Curbera |
Effect of Using Automated Auditing Tools on Detecting Compliance Failures in Unmanaged Processes. |
BPM |
2009 |
DBLP DOI BibTeX RDF |
Topics covered BPM Governance and Compliance, Management Issues and Empirical Studies, Non-traditional BPM Scenarios |
34 | Daniel P. Lopresti, Xiang Zhou, Xiaolei Huang 0001, Gang Tan |
Document Analysis Support for the Manual Auditing of Elections. |
ICDAR |
2009 |
DBLP DOI BibTeX RDF |
|
34 | Bart Orriëns, Willem-Jan van den Heuvel, Mike P. Papazoglou |
On the Risk Management and Auditing of SOA Based Business Processes. |
ISoLA |
2008 |
DBLP DOI BibTeX RDF |
|
34 | Gerardo Canfora, Bice Cavallo |
A Bayesian Approach for on-Line Max Auditing. |
ARES |
2008 |
DBLP DOI BibTeX RDF |
|
34 | Theodoros Levantakis, Remko Helms, Marco R. Spruit |
Developing a Reference Method for Knowledge Auditing. |
PAKM |
2008 |
DBLP DOI BibTeX RDF |
knowledge audit, knowledge strategy process, Knowledge management, social network analysis, method engineering |
34 | Gerardo Canfora, Bice Cavallo |
Reasoning under Uncertainty in On-Line Auditing. |
Privacy in Statistical Databases |
2008 |
DBLP DOI BibTeX RDF |
|
34 | Nathan Whitehead, Jordan Johnson, Martín Abadi |
Policies and Proofs for Code Auditing. |
ATVA |
2007 |
DBLP DOI BibTeX RDF |
|
34 | Sergio Gutiérrez Santos, Grégory Valigiani, Yannick Jamont, Pierre Collet, Carlos Delgado Kloos |
A Swarm Approach for Automatic Auditing of Pedagogical Planning. |
ICALT |
2007 |
DBLP DOI BibTeX RDF |
|
34 | Reinhard Riedl, Manuel Juen |
IT Auditing in E-Government. |
EGOV |
2006 |
DBLP DOI BibTeX RDF |
|
34 | Muriel Roger, Jean Goubault-Larrecq |
Log Auditing through Model-Checking. |
CSFW |
2001 |
DBLP DOI BibTeX RDF |
|
34 | Roger W. H. Bons, Frank Dignum, Ronald M. Lee, Yao-Hua Tan |
A Formal Specification of Automated Auditing of Trustworthy Trade Procedures for Open Electronic Commerce. |
HICSS |
1999 |
DBLP DOI BibTeX RDF |
|
33 | Yong Wang, Daniel Burgener, Aleksandar Kuzmanovic, Gabriel Maciá-Fernández |
Analyzing content-level properties of the web adversphere. |
WWW |
2010 |
DBLP DOI BibTeX RDF |
location-based advertising, web-based ad network, behavioral targeting |
33 | Pingping Zhang, Shiguang Ju, Weihe Chen |
A Location-Based Secure Spatial Audit Policy Model. |
CSSE (4) |
2008 |
DBLP DOI BibTeX RDF |
|
33 | Siman Wong |
An authentication protocol in Web-computing. |
IPDPS |
2006 |
DBLP DOI BibTeX RDF |
|
33 | Rakesh Agrawal 0001, Evimaria Terzi |
On Honesty in Sovereign Information Sharing. |
EDBT |
2006 |
DBLP DOI BibTeX RDF |
|
33 | Yao-Wen Huang, Chung-Hung Tsai, D. T. Lee, Sy-Yen Kuo |
Non-Detrimental Web Application Security Scanning. |
ISSRE |
2004 |
DBLP DOI BibTeX RDF |
|
33 | Nikos Ntarmos, Peter Triantafillou |
SeAl: Managing Accesses and Data in Peer-to-Peer Sharing Networks. |
Peer-to-Peer Computing |
2004 |
DBLP DOI BibTeX RDF |
|
31 | Zhixiong Chen, Jong P. Yoon, Christopher M. Frenz, Kenneth Compres |
IT Governance, Compliance and Auditing Curriculum-A Pedagogical Perspective. |
SERVICES |
2011 |
DBLP DOI BibTeX RDF |
Assessment, Curriculum, Compliance, Principles, Body of Knowledge, IT Auditing |
31 | Wil M. P. van der Aalst, Kees M. van Hee, Jan Martijn E. M. van der Werf, Marc Verdonk |
Auditing 2.0: Using Process Mining to Support Tomorrow's Auditor. |
Computer |
2010 |
DBLP DOI BibTeX RDF |
Auditing 2.0, Information technology, Process mining, IT systems |
31 | Zhixiong Chen, John Yoon |
IT Auditing to Assure a Secure Cloud Computing. |
SERVICES |
2010 |
DBLP DOI BibTeX RDF |
Secure Cloud Computing, IT Compkiance, IT Auditing |
31 | Gerardo Canfora, Bice Cavallo |
A Probabilistic Approach for On-Line Sum-Auditing. |
ARES |
2010 |
DBLP DOI BibTeX RDF |
sum-auditing, Privacy, Bayesian networks, Statistical databases |
31 | Chrysovalantis Gaganis, Constantin Zopounidis |
Multicriteria Decision Support Methodologies for Auditing Decisions. |
Encyclopedia of Optimization |
2009 |
DBLP DOI BibTeX RDF |
Qualified audit reports, Classification, Auditing, Multicriteria decision aid |
31 | José Fonseca 0002, Marco Vieira, Henrique Madeira |
Online detection of malicious data access using DBMS auditing. |
SAC |
2008 |
DBLP DOI BibTeX RDF |
DBMS auditing, intrusion detection, SQL injection |
31 | Josh Goodman, Clark Verbrugge |
A peer auditing scheme for cheat elimination in MMOGs. |
NETGAMES |
2008 |
DBLP DOI BibTeX RDF |
peer auditing, peer to peer, computer games, network model, trust model, cheating |
31 | Levent V. Orman |
Database auditing. |
ICIS |
1997 |
DBLP BibTeX RDF |
audit performance, audit strategies, database auditing, optimum audit strategies, optimum timing of audits, database integrity |
29 | Yitao Duan |
Privacy without noise. |
CIKM |
2009 |
DBLP DOI BibTeX RDF |
simulatable query auditing, sum queries, differential privacy |
29 | Ali Razavi, Kostas Kontogiannis |
Pattern and Policy Driven Log Analysis for Software Monitoring. |
COMPSAC |
2008 |
DBLP DOI BibTeX RDF |
Software Auditing, Trace Analysis, Software Monitoring |
29 | Alexandre V. Evfimievski, Ronald Fagin, David P. Woodruff |
Epistemic privacy. |
PODS |
2008 |
DBLP DOI BibTeX RDF |
positivstellensatz, privacy, auditing, query logs, disclosure, reasoning about knowledge, supermodularity |
29 | Florian Kerschbaum, Julien Vayssière |
Privacy-preserving data analytics as an outsourced service. |
SWS |
2008 |
DBLP DOI BibTeX RDF |
data analytics, remote auditing, outsourcing, searchable encryption |
29 | Paul H. Dietz, Bret Harsham, Clifton Forlines, Darren Leigh, William S. Yerazunis, Sam Shipman, Bent Schmidt-Nielsen, Kathy Ryall |
DT controls: adding identity to physical interfaces. |
UIST |
2005 |
DBLP DOI BibTeX RDF |
DiamondTouch, haptics, identity, auditing, multi-user, physical interfaces |
29 | Robert Grimm 0001, Brian N. Bershad |
Separating access control policy, enforcement, and functionality in extensible systems. |
ACM Trans. Comput. Syst. |
2001 |
DBLP DOI BibTeX RDF |
access check, policy-neutral enforcement, protection domain transfer, Java, security policy, auditing, SPIN, extensible systems, protection domain |
29 | John P. McDermott, R. Gelinas, S. Ornstein |
Doc, Wyatt, and Virgil: Prototyping Storage Jamming Defenses. |
ACSAC |
1997 |
DBLP DOI BibTeX RDF |
Doc, Wyatt, Virgil, storage jamming defense, storage jamming attack detection, replay defense, attack source determination, attack pattern determination, object-oriented data storage, application-specific techniques, access control, encryption, auditing, software prototyping, checksums, virus detection, prototype tools, logical replication, information warfare |
25 | Peng Jiang, Ruizhe Huang, Ding Li 0001, Yao Guo 0001, Xiangqun Chen, Jianhai Luan, Yuxin Ren 0001, Xinwei Hu |
Auditing Frameworks Need Resource Isolation: A Systematic Study on the Super Producer Threat to System Auditing and Its Mitigation. |
CoRR |
2023 |
DBLP DOI BibTeX RDF |
|
25 | Yinghui Huang, Wenting Shen, Jing Qin 0002, Huiying Hou |
Privacy-preserving certificateless public auditing supporting different auditing frequencies. |
Comput. Secur. |
2023 |
DBLP DOI BibTeX RDF |
|
25 | Peng Jiang, Ruizhe Huang, Ding Li 0001, Yao Guo 0001, Xiangqun Chen, Jianhai Luan, Yuxin Ren 0001, Xinwei Hu |
Auditing Frameworks Need Resource Isolation: A Systematic Study on the Super Producer Threat to System Auditing and Its Mitigation. |
USENIX Security Symposium |
2023 |
DBLP BibTeX RDF |
|
25 | Tariqul Islam 0001, Kamrul Hasan, Saheb Singh, Joon S. Park |
A Secure and Decentralized Auditing Scheme for Cloud Ensuring Data Integrity and Fairness in Auditing. |
CSCloud/EdgeCom |
2022 |
DBLP DOI BibTeX RDF |
|
25 | Lei Zeng, Yang Xiao 0001, Hui Chen 0001 |
Auditing overhead, auditing adaptation, and benchmark evaluation in Linux. |
Secur. Commun. Networks |
2015 |
DBLP DOI BibTeX RDF |
|
25 | Mary B. Curtis |
Discussion of 'The antecedents of the use of continuous auditing in the internal auditing context'. |
Int. J. Account. Inf. Syst. |
2012 |
DBLP DOI BibTeX RDF |
|
25 | George C. Gonzalez, Pratyush Nidhi Sharma, Dennis F. Galletta |
The antecedents of the use of continuous auditing in the internal auditing context. |
Int. J. Account. Inf. Syst. |
2012 |
DBLP DOI BibTeX RDF |
|
25 | Jia Xu |
Auditing the Auditor: Secure Delegation of Auditing Operation over Cloud Storage. |
IACR Cryptol. ePrint Arch. |
2011 |
DBLP BibTeX RDF |
|
25 | C. Paul Morrey, James Geller, Michael Halper, Yehoshua Perl |
The Neighborhood Auditing Tool: A hybrid interface for auditing the UMLS. |
J. Biomed. Informatics |
2009 |
DBLP DOI BibTeX RDF |
|
25 | Chien-Chih Yu, Hung-Chao Yu, Chi-Chun Chou |
The impacts of electronic commerce on auditing practices: an auditing process model for evidence collection and validation. |
Intell. Syst. Account. Finance Manag. |
2000 |
DBLP DOI BibTeX RDF |
|
23 | Daisuke Takahashi, Yang Xiao 0001 |
Complexity Analysis of Retrieving Knowledge from Auditing Log Files for Computer and Network Forensics and Accountability. |
ICC |
2008 |
DBLP DOI BibTeX RDF |
|
23 | João Paulo S. Medeiros, Selan R. dos Santos |
RadialNet: An Interactive Network Topology Visualization Tool with Visual Auditing Support. |
CRITIS |
2008 |
DBLP DOI BibTeX RDF |
|
23 | Francesco M. Malvestuto |
Auditing Categorical SUM, MAX and MIN Queries. |
Privacy in Statistical Databases |
2008 |
DBLP DOI BibTeX RDF |
sum-query, max-query, min-query, null values, Aggregate function |
23 | Rakesh Agrawal 0001, Alexandre V. Evfimievski, Jerry Kiernan, Raja Velu |
Auditing disclosure by relevance ranking. |
SIGMOD Conference |
2007 |
DBLP DOI BibTeX RDF |
derivation probability, hippocratic database, information retrieval, privacy, record linkage |
23 | Michael Elliott, Ray Dawson, Janet Edwards |
Towards real process improvement from internal auditing - A case study. |
Softw. Qual. J. |
2006 |
DBLP DOI BibTeX RDF |
|
23 | Ho Lee, Jung Hwan Song |
Designing Security Auditing Protocol with Web Browsers. |
WISA |
2005 |
DBLP DOI BibTeX RDF |
|
23 | Pier Luigi Emiliani, Laura Burzagli |
W3C-WAI Content Accessibility Auditing. |
Universal Access in Health Telematics |
2005 |
DBLP DOI BibTeX RDF |
|
23 | Jingyu Zhou, Giovanni Vigna |
Detecting Attacks That Exploit Application-Logic Errors Through Application-Level Auditing. |
ACSAC |
2004 |
DBLP DOI BibTeX RDF |
|
23 | Rebecca Mercuri |
On auditing trails. |
Commun. ACM |
2003 |
DBLP DOI BibTeX RDF |
|
23 | Francesco M. Malvestuto, Mauro Mezzini |
Auditing Sum Queries. |
ICDT |
2003 |
DBLP DOI BibTeX RDF |
|
23 | Robert Chalice, Olga M. Haring, Ronald R. Hochsprung |
Automated patient record summaries for health care auditing. |
AFIPS National Computer Conference |
1974 |
DBLP DOI BibTeX RDF |
|
22 | Ragib Hasan, Marianne Winslett |
Trustworthy vacuuming and litigation holds in long-term high-integrity records retention. |
EDBT |
2010 |
DBLP DOI BibTeX RDF |
|
22 | Pei-Te Chen, Chi-Sung Laih |
IDSIC: an intrusion detection system with identification capability. |
Int. J. Inf. Sec. |
2008 |
DBLP DOI BibTeX RDF |
Identification capability, System managers (SMs), Security auditors (SAs), Fingerprints, Intrusion detection systems (IDSs) |
22 | Alec Yasinsac, Matt Bishop |
The Dynamics of Counting and Recounting Votes. |
IEEE Secur. Priv. |
2008 |
DBLP DOI BibTeX RDF |
|
22 | Jeffrey A. Vaughan, Limin Jia 0001, Karl Mazurak, Steve Zdancewic |
Evidence-Based Audit. |
CSF |
2008 |
DBLP DOI BibTeX RDF |
Access control, Logic, Audit, Computer Languages |
22 | Hakan Hacigümüs |
Efficient Dynamic Policy Monitoring in Service Oriented Architectures. |
APSCC |
2008 |
DBLP DOI BibTeX RDF |
|
22 | Jisheng Wang, David J. Miller 0001, George Kesidis |
Efficient Mining of the Multidimensional Traffic Cluster Hierarchy for Digesting, Visualization, and Anomaly Identification. |
IEEE J. Sel. Areas Commun. |
2006 |
DBLP DOI BibTeX RDF |
|
22 | Juan José Salazar González |
Controlled rounding and cell perturbation: statistical disclosure limitation methods for tabular data. |
Math. Program. |
2006 |
DBLP DOI BibTeX RDF |
Controlled rounding, Integer linear Programming, Statistical disclosure Control |
Displaying result #1 - #100 of 2122 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ >>] |
|