Sciweavers

609 search results - page 66 / 122
» Computation of Homology Groups and Generators
Sort
View
VLDB
2006
ACM
122views Database» more  VLDB 2006»
16 years 1 days ago
A secure distributed framework for achieving k-anonymity
k-anonymity provides a measure of privacy protection by preventing re-identification of data to fewer than a group of k data items. While algorithms exist for producing k-anonymous...
Wei Jiang, Chris Clifton
ICDCSW
2003
IEEE
15 years 5 months ago
Privilege Delegation and Agent-Oriented Access Control in Naplet
Access control in existing Java-based mobile agents is mostly based on code source due to limitations of early Java security architecture. That is, authorization is based on where...
Cheng-Zhong Xu, Song Fu
AISC
2010
Springer
15 years 4 months ago
Formal Proof of SCHUR Conjugate Function
Abstract. The main goal of our work is to formally prove the correctness of the key commands of the SCHUR software, an interactive program for calculating with characters of Lie gr...
Franck Butelle, Florent Hivert, Micaela Mayero, Fr...
HPCN
1994
Springer
15 years 3 months ago
Experiments with HPF Compilation for a Network of Workstations
Abstract. High Performance Fortran (hpf) is a data-parallel Fortran for Distributed Memory Multiprocessors. Hpf provides an interesting programming model but compilers are yet to c...
Fabien Coelho
CHI
1992
ACM
15 years 3 months ago
Coupling Application Design and User Interface Design
Building an interactive application requires, amongst other activities, the design of both a data model and a user interface. These two designs are often done separately, frequent...
Dennis J. M. J. de Baar, James D. Foley, Kevin E. ...