Sciweavers

18374 search results - page 71 / 3675
» Applications for data hiding
Sort
View
OOPSLA
1992
Springer
15 years 9 months ago
Concurrency Annotations
JAC is a Java extension for high-level concurrent programming, meant to hide the notions of threads and synchronization statements from the programmer. Putting into practice the c...
Klaus-Peter Löhr
CORR
2007
Springer
76views Education» more  CORR 2007»
15 years 5 months ago
Guessing based on length functions
— Close relationships between guessing functions and length functions are established. Good length functions lead to good guessing functions. In particular, guessing in the incre...
Rajesh Sundaresan
ISDA
2008
IEEE
15 years 11 months ago
Novel Algorithms for Privacy Preserving Utility Mining
Privacy Preserving Data Mining (PPDM) has become a popular topic in the research community. How to strike a balance between privacy protection and knowledge discovery in the shari...
Jieh-Shan Yeh, Po-Chiang Hsu, Ming-Hsun Wen
BTW
2005
Springer
177views Database» more  BTW 2005»
15 years 11 months ago
Adaptive XML Access Control Based on Query Nesting, Modification and Simplification
: Access control is an important aspect in guaranteeing data privacy within XML data sources which are accessed by users with different access rights. The goal of predicative acces...
Stefan Böttcher, Rita Steinmetz
DASFAA
2008
IEEE
163views Database» more  DASFAA 2008»
15 years 12 months ago
Automated Data Discovery in Similarity Score Queries
A vast amount of information is being stored in scientific databases on the web. The dynamic nature of the scientific data, the cost of providing an up-to-date snapshot of the wh...
Fatih Altiparmak, Ali Saman Tosun, Hakan Ferhatosm...