Sciweavers

498 search results - page 70 / 100
» Being Sensitive to Uncertainty
Sort
View
DASFAA
2010
IEEE
148views Database» more  DASFAA 2010»
15 years 2 months ago
Competitive Privacy: Secure Analysis on Integrated Sequence Data
Sequence data analysis has been extensively studied in the literature. However, most previous work focuses on analyzing sequence data from a single source or party. In many applica...
Raymond Chi-Wing Wong, Eric Lo
ICDCS
1998
IEEE
15 years 2 months ago
A Mechanism for Establishing Policies for Electronic Commerce
This paper introduces a mechanism for establishing policies for electronic commerce in a uni ed and secure manner. A commercial policy can be viewed as the embodiment of a contrac...
Naftaly H. Minsky, Victoria Ungureanu
PAKDD
1999
ACM
113views Data Mining» more  PAKDD 1999»
15 years 2 months ago
Characterization of Default Knowledge in Ripple Down Rules Method
Abstract. \Ripple Down Rules (RDR)" Method is one of the promising approaches to directly acquire and encode knowledge from human experts. It requires data to be supplied incr...
Takuya Wada, Tadashi Horiuchi, Hiroshi Motoda, Tak...
VLDB
1994
ACM
114views Database» more  VLDB 1994»
15 years 2 months ago
On Index Selection Schemes for Nested Object Hierarchies
In this paper we address the problem of devising a set of indexes for a nested object hierarchy in an object-oriented database to improve the overall system performance. It is not...
Sudarshan S. Chawathe, Ming-Syan Chen, Philip S. Y...
CCS
2010
ACM
15 years 2 months ago
Data protection in outsourcing scenarios: issues and directions
Data outsourcing is an emerging paradigm that allows users and companies to give their (potentially sensitive) data to external servers that then become responsible for their stor...
Pierangela Samarati, Sabrina De Capitani di Vimerc...