Sciweavers

455 search results - page 89 / 91
» Differential Privacy in New Settings
Sort
View
ICDE
2007
IEEE
162views Database» more  ICDE 2007»
15 years 11 months ago
On Density Based Transforms for Uncertain Data Mining
In spite of the great progress in the data mining field in recent years, the problem of missing and uncertain data has remained a great challenge for data mining algorithms. Many ...
Charu C. Aggarwal
INFOCOM
1999
IEEE
15 years 1 months ago
Key Management for Secure Internet Multicast Using Boolean Function Minimization Techniques
Abstract-The Internet today provides no support for privacy or authentication of multicast packets. However,an increasing number of applications will require secure multicast servi...
Isabella Chang, Robert Engel, Dilip D. Kandlur, Di...
ICALP
2009
Springer
15 years 9 months ago
Secure Function Collection with Sublinear Storage
Consider a center possessing a trusted (tamper proof) device that wishes to securely compute a public function over private inputs that are contributed by some network nodes. In ne...
Maged H. Ibrahim, Aggelos Kiayias, Moti Yung, Hong...
ICSE
2008
IEEE-ACM
15 years 9 months ago
The international workshop on software architectures and mobility (SAM 2008)
E-businesses are increasingly facing the need of porting the provision of their e-services to mobile customers. Evolving requirements, such as reliability, security, scalability, ...
Licia Capra, Rami Bahsoon, Wolfgang Emmerich, Moha...
OOPSLA
2005
Springer
15 years 3 months ago
GOOAL: an educational object oriented analysis laboratory
Our goal is to enable rapid production of static and dynamic object models from natural language description of problems. Rapid modeling is achieved through automation of analysis...
Hector G. Pérez-González, Jugal K. K...