Sciweavers

30 search results - page 6 / 6
» Meta-programming with names and necessity
Sort
View
CCS
2001
ACM
13 years 9 months ago
Secure Open Systems for Protecting Privacy and Digital Services
This paper describes and analyzes a system architecture that enables consumers to access services and content from multiple providers without jeopardizing the privacy interests of...
David W. Kravitz, Kim-Ee Yeoh, Nicol So
ACSAC
2000
IEEE
13 years 9 months ago
Applications in Health Care using Public-Key Certificates and Attribute Certificates
Security infrastructures are increasingly used in the health care and welfare sector, particularly for providing security, like confidentiality, authenticity, integrity, nonrepudi...
Petra Wohlmacher, Peter Pharow
COLT
1997
Springer
13 years 9 months ago
Algorithmic Stability and Sanity-Check Bounds for Leave-one-Out Cross-Validation
: In this paper we prove sanity-check bounds for the error of the leave-one-out cross-validation estimate of the generalization error: that is, bounds showing that the worst-case e...
Michael J. Kearns, Dana Ron
JASIS
2000
68views more  JASIS 2000»
13 years 5 months ago
Tropes, history, and ethics in professional discourse and information science
: This paper argues that professional discourses tend to align themselves with dominant ideological and social forces by means of language. In twentieth century modernity, the use ...
Ronald Day
BIRTHDAY
2010
Springer
13 years 4 months ago
The Architecture Description Language MoDeL
m, modules, types and operations), different kinds of abstractions (functional/data, types/objects etc.) without falling into a loose collection of diagram languages. Considering a...
Peter Klein