Sciweavers

455 search results - page 33 / 91
» Differential Privacy in New Settings
Sort
View
OOPSLA
1991
Springer
15 years 1 months ago
Object-Oriented Type Inference
We present a new approach to inferring types in untyped object-oriented programs with inheritance, assignments, and late binding. It guarantees that all messages are understood, a...
Jens Palsberg, Michael I. Schwartzbach
ECIS
2001
14 years 11 months ago
Modelling IS successions in e commerce
The paper considers the conditions governing the diffusion and development of e-commerce. The analysis builds on earlier discussions of technological successions and explores a nu...
Paul Windrum, Chris Birchenhall, Ray Hackney
GLOBECOM
2009
IEEE
15 years 4 months ago
Reusable Set Constructions Using Randomized Dissolvent Templates for Biometric Security
—The emerging biometric cryptography has gained significant interests for key management and privacy protection, but the previously proposed schemes using set metrics for finge...
Jinyang Shi, Kwok-Yan Lam, Ming Gu, Husheng Li
ITCC
2003
IEEE
15 years 2 months ago
A New Quality of Service Metric for Hard/Soft Real-Time Applications
Real-time applications often have mixed hard and soft deadlines, can be preempted subject to the cost of context switching or the restart of computation, and have various data dep...
Shaoxiong Hua, Gang Qu
CARDIS
2006
Springer
159views Hardware» more  CARDIS 2006»
15 years 1 months ago
Noisy Tags: A Pretty Good Key Exchange Protocol for RFID Tags
We propose a protocol that can be used between an RFID tag and a reader to exchange a secret without performing any expensive computation. Similarly to the famous blocker tag sugge...
Claude Castelluccia, Gildas Avoine