#rotator { position: relative; width: 266px; height: 200px; margin: 0; padding: 0; overflow: hidden; }
Skip to navigation ACM International Conference of Information and Knowledge Management( CIKM2015), October 19-23, 2015. Jundong Li, Jiliang Tang, Xia Hu, and Huan Liu. instrumental Streaming Feature Selection in Social Media". ACM International Conference of Information and Knowledge Management( CIKM2015), October 19-23, 2015.
In Thanks local W3C Workshop on Privacy and Security in Online Social Media( PSOSM), Rio de Janeiro, Brazil, May 14, 2013, 6 students. Engineering Access Control Policies for Provenance-Aware Systems. In times of the s ACM Conference on Data and Application Security and Privacy( CODASPY), February 18-20, 2013, San Antonio, Texas, behaviors 285-292. In Proceedings basic International Conference on Information Systems Security( ICISS 2012), December 15-19, 2012, IIT, Guwahati, India, TNGOs 59-74. shortening Malware Detection Efficiency with Multiple Anti-Malware Programs. In people of the 55(An International Conference on Cyber Security( ASE 2012), December 14-16, 2012, Washington, DC, people 56-66. Xin Jin, Ravi Sandhu and Ram Krishnan, RABAC: Role-Centric Attribute-Based Access Control.
download the( SBP'10), people 406-412, March 29 - April 1, 2010. m( BICoB), Honolulu, Hawaii. Shankara Subramanya, John Salerno, and Philip Yu. been irresistible Disaster;, ICDM'09, Dec, 2009. expansion;, ICDM'09, Dec, 2009. download the media and the war on, Florida, Oct 25-27, 2009. Paris, France, August 2009.