Sciweavers

1662 search results - page 1 / 333
» Privately Finding Specifications
Sort
View
TSE
2008
91views more  TSE 2008»
13 years 4 months ago
Privately Finding Specifications
Buggy software is a reality and automated techniques for discovering bugs are highly desirable. A specification describes the correct behavior of a program. For example, a file mus...
Westley Weimer, Nina Mishra
LCN
2000
IEEE
13 years 9 months ago
Performance Impact of Data Compression on Virtual Private Network Transactions
Virtual private networks (VPNs) allow two or more parties to communicate securely over a public network. Using cryptographic algorithms and protocols, VPNs provide security servic...
John Patrick McGregor, Ruby B. Lee
POLICY
2007
Springer
13 years 11 months ago
Call Management Policy Specification for the Asterisk Telephone Private Branch Exchange
A VoIP PBX supports flexible call handling functionality for selective forwarding, cost based outward call routing, recording calls etc. Both users and administrators need a flexi...
George Konstantoulakis, Morris Sloman
KDD
2006
ACM
181views Data Mining» more  KDD 2006»
14 years 5 months ago
Cryptographically private support vector machines
We study the problem of private classification using kernel methods. More specifically, we propose private protocols implementing the Kernel Adatron and Kernel Perceptron learning ...
Helger Lipmaa, Sven Laur, Taneli Mielikäinen
IEPOL
2006
51views more  IEPOL 2006»
13 years 4 months ago
An empirical analysis of voluntary payments for information goods on the Internet
This paper presents results from a field study on voluntary contributions for an information public good provided via the Internet (an electronic newsletter for authors). Whereas ...
Rainald Borck, Björn Frank, Julio R. Robledo