Sciweavers

445 search results - page 73 / 89
» A Call Abstraction for Component Coordination
Sort
View
CTRSA
2005
Springer
88views Cryptology» more  CTRSA 2005»
15 years 5 months ago
Sub-linear Queries Statistical Databases: Privacy with Power
Abstract. We consider a statistical database in which a trusted administrator introduces noise to the query responses with the goal of maintaining privacy of individual database en...
Cynthia Dwork
OTM
2005
Springer
15 years 5 months ago
An Ontology- and Resources-Based Approach to Evolution and Reactivity in the Semantic Web
Abstract. The Web of today can be seen as an active and heterogeneous infrastructure of autonomous systems, where reactivity, evolution and propagation of information and changes p...
Wolfgang May, José Júlio Alferes, Ri...
AUSAI
2003
Springer
15 years 5 months ago
Information Extraction via Path Merging
Abstract. In this paper, we describe a new approach to information extraction that neatly integrates top-down hypothesis driven information with bottom-up data driven information. ...
Robert Dale, Cécile Paris, Marc Tilbrook
CRYPTO
2003
Springer
93views Cryptology» more  CRYPTO 2003»
15 years 5 months ago
Universal Composition with Joint State
Abstract. Cryptographic systems often involve running multiple concurrent instances of some protocol, where the instances have some amount of joint state and randomness. (Examples ...
Ran Canetti, Tal Rabin
DNA
2003
Springer
122views Bioinformatics» more  DNA 2003»
15 years 5 months ago
Self-Assembled Circuit Patterns
Abstract. Self-assembly is a process in which basic units aggregate under attractive forces to form larger compound structures. Recent theoretical work has shown that pseudo-crysta...
Matthew Cook, Paul W. K. Rothemund, Erik Winfree