Sciweavers

2610 search results - page 294 / 522
» Computational Probabilistic Non-interference
Sort
View
PODS
2005
ACM
119views Database» more  PODS 2005»
16 years 4 months ago
Security analysis of cryptographically controlled access to XML documents
Some promising recent schemes for XML access control employ encryption for implementing security policies on published data, avoiding data duplication. In this paper we study one ...
Bogdan Warinschi, Martín Abadi
MOBISYS
2006
ACM
16 years 3 months ago
Building realistic mobility models from coarse-grained traces
In this paper we present a trace-driven framework capable of building realistic mobility models for the simulation studies of mobile systems. With the goal of realism, this framew...
Jungkeun Yoon, Brian D. Noble, Mingyan Liu, Minkyo...
MOBIHOC
2008
ACM
16 years 3 months ago
Routing in a cyclic mobispace
A key challenge of routing in delay tolerant networks (DTNs) is to find routes that have high delivery rates and low endto-end delays. When oracles are not available for future co...
Cong Liu, Jie Wu
FOSSACS
2009
Springer
15 years 10 months ago
Coalgebraic Hybrid Logic
Abstract. We introduce a generic framework for hybrid logics, i.e. modal logics additionally featuring nominals and satisfaction operators, thus providing the necessary facilities ...
Rob Myers, Dirk Pattinson, Lutz Schröder
IDA
2009
Springer
15 years 10 months ago
Two-Way Grouping by One-Way Topic Models
Abstract. We tackle the problem of new users or documents in collaborative filtering. Generalization over users by grouping them into user groups is beneficial when a rating is t...
Eerika Savia, Kai Puolamäki, Samuel Kaski