R Samavi, MP Consens - 8th International Conference on …, 2012 - ieeexplore.ieee.org
We describe a framework designed to facilitate privacy auditing while accommodating a variety of privacy scenarios and policies that involve multiple participants. Our proposal is …
Fast, massive, and viral data diffused on social media affects a large share of the online population, and thus, the (prospective) information diffusion mechanisms behind it are of …
H Firth, P Missier - Distributed and Parallel Databases, 2017 - Springer
Graph partitioning has long been seen as a viable approach to addressing Graph DBMS scalability. A partitioning, however, may introduce extra query processing latency unless it is …
The use of artificial intelligence (AI) and machine learning (ML) models in various domain spaces continues to reveal the lack of understanding that end-users, and even developers …
Information produced by Internet applications is inherently a result of processes that are executed locally. Think of a web server that makes use of a CGI script, or a content …
It is commonly believed that provenance can be utilised to form assessments about the quality, reliability or trustworthiness of data. Once presented with contradictory or …
In response to the increasing calls for algorithmic accountability, UML2PROV is a novel approach to address the existing gap between application design, where models are …
Social networks foster the development of social sensing to gather data about situations in the environment. Making sense of this information is, however, a challenge because the …
In this paper we present UML2PROV, an approach addressing the gap between application design, through UML diagrams, and provenance design, using PROV-Template. PROV …