Sciweavers

4270 search results - page 168 / 854
» A Permutation Approach to Validation
Sort
View
178
Voted
TDSC
2011
14 years 12 months ago
An Obfuscation-Based Approach for Protecting Location Privacy
—The pervasive diffusion of mobile communication devices and the technical improvements of location techniques are fostering the development of new applications that use the phys...
Claudio Agostino Ardagna, Marco Cremonini, Sabrina...
JMLR
2012
13 years 7 months ago
Domain Adaptation: A Small Sample Statistical Approach
We study the prevalent problem when a test distribution differs from the training distribution. We consider a setting where our training set consists of a small number of sample d...
Ruslan Salakhutdinov, Sham M. Kakade, Dean P. Fost...
SE
2007
15 years 6 months ago
Requirements traceability in the model-based testing process
: Automated test case and test driver generation from a precise behaviour UML model is an emerging approach for software functional validation. This innovative approach for validat...
Eddy Bernard, Bruno Legeard
135
Voted
SACRYPT
2009
Springer
130views Cryptology» more  SACRYPT 2009»
15 years 11 months ago
Format-Preserving Encryption
Format-preserving encryption (FPE) encrypts a plaintext of some specified format into a ciphertext of identical format—for example, encrypting a valid credit-card number into a ...
Mihir Bellare, Thomas Ristenpart, Phillip Rogaway,...
130
Voted
MOBICOM
2004
ACM
15 years 10 months ago
Detecting and correcting malicious data in VANETs
In order to meet performance goals, it is widely agreed that vehicular ad hoc networks (VANETs) must rely heavily on node-to-node communication, thus allowing for malicious data t...
Philippe Golle, Daniel H. Greene, Jessica Staddon