Sciweavers

69 search results - page 10 / 14
» A General Proximity Privacy Principle
Sort
View
99
Voted
KDD
2005
ACM
149views Data Mining» more  KDD 2005»
15 years 3 months ago
A distributed learning framework for heterogeneous data sources
We present a probabilistic model-based framework for distributed learning that takes into account privacy restrictions and is applicable to scenarios where the different sites ha...
Srujana Merugu, Joydeep Ghosh
74
Voted
CCS
2007
ACM
15 years 4 months ago
A data outsourcing architecture combining cryptography and access control
Data outsourcing is becoming today a successful solution that allows users and organizations to exploit external servers for the distribution of resources. Some of the most challe...
Sabrina De Capitani di Vimercati, Sara Foresti, Su...
83
Voted
AGENTS
2001
Springer
15 years 2 months ago
Argumentation as distributed constraint satisfaction: applications and results
Conflict resolution is a critical problem in distributed and collaborative multi-agent systems. Negotiation via argumentation (NVA), where agents provide explicit arguments or ju...
Hyuckchul Jung, Milind Tambe, Shriniwas Kulkarni
CCS
2001
ACM
15 years 2 months ago
Events in security protocols
The events of a security protocol and their causal dependency can play an important role in the analysis of security properties. This insight underlies both strand spaces and the ...
Federico Crazzolara, Glynn Winskel
88
Voted
OOPSLA
2001
Springer
15 years 2 months ago
Multitasking without Compromise: A Virtual Machine Evolution
The Multitasking Virtual Machine (called from now on simply MVM) is a modification of the Java™ virtual machine. It enables safe, secure, and scalable multitasking. Safety is ac...
Grzegorz Czajkowski, Laurent Daynès