Sciweavers

1779 search results - page 309 / 356
» A Formal Model of Data Privacy
Sort
View
CIKM
2009
Springer
16 years 1 days ago
POkA: identifying pareto-optimal k-anonymous nodes in a domain hierarchy lattice
Data generalization is widely used to protect identities and prevent inference of sensitive information during the public release of microdata. The k-anonymity model has been exte...
Rinku Dewri, Indrajit Ray, Indrakshi Ray, Darrell ...
LATIN
2010
Springer
16 years 8 days ago
The Language Theory of Bounded Context-Switching
Concurrent compositions of recursive programs with finite a natural abstraction model for concurrent programs. Since reachability is undecidable for this class, a restricted form ...
Salvatore La Torre, Parthasarathy Madhusudan, Genn...
RTAS
2006
IEEE
15 years 11 months ago
Network-Code Machine: Programmable Real-Time Communication Schedules
Distributed hard real-time systems require guaranteed communication. One common approach is to restrict network access by enforcing a time-division multiple access (TDMA) schedule...
Sebastian Fischmeister, Oleg Sokolsky, Insup Lee
WWW
2005
ACM
15 years 11 months ago
Hera presentation generator
Semantic Web Information Systems (SWIS) are Web Information Systems that use Semantic Web technologies. Hera is a modeldriven design methodology for SWIS. In Hera, models are repr...
Flavius Frasincar, Geert-Jan Houben, Peter Barna
FC
2005
Springer
110views Cryptology» more  FC 2005»
15 years 11 months ago
Approximate Message Authentication and Biometric Entity Authentication
Approximate Message Authentication Code (AMAC) is a recently introduced cryptographic primitive with several applications in the areas of cryptography and coding theory. Briefly s...
Giovanni Di Crescenzo, R. F. Graveman, Renwei Ge, ...