Sciweavers

STOC
2010
ACM
193views Algorithms» more  STOC 2010»
15 years 8 months ago
Privacy Amplification with Asymptotically Optimal Entropy Loss
We study the problem of "privacy amplification": key agreement between two parties who both know a weak secret w, such as a password. (Such a setting is ubiquitous on th...
Nishanth Chandran, Bhavana Kanukurthi, Rafail Ostr...
DASFAA
2010
IEEE
165views Database» more  DASFAA 2010»
15 years 8 months ago
Towards an Algebraic Framework for Querying Inductive Databases
Abstract. In this paper, we present a theoretical foundation for querying inductive databases, which can accommodate disparate mining tasks. We present a data mining algebra includ...
Hong-Cheu Liu, Aditya Ghose, John Zeleznikow
APSEC
2009
IEEE
15 years 8 months ago
Sequence Diagram Slicing
Software visualization with sequence diagrams is one of the promising techniques aimed at helping developers comprehend the behavior of object-oriented systems effectively. However...
Kunihiro Noda, Takashi Kobayashi, Kiyoshi Agusa, S...
AOSD
2009
ACM
15 years 8 months ago
A generic and reflective debugging architecture to support runtime visibility and traceability of aspects
In this paper we present a generic, mirror-based debugging architecture that supports runtime visibility and traceability of aspect oriented (AO) software systems. Runtime visibil...
Wouter De Borger, Bert Lagaisse, Wouter Joosen
ICPR
2010
IEEE
15 years 8 months ago
Vehicle Recognition As Changes in Satellite Imagery
Over the last several years, a new probabilistic representation for 3-d volumetric modeling has been developed. The main purpose of the model is to detect deviations from the norm...
Ozge Can Ozcanli, Joseph Mundy