Sciweavers

5255 search results - page 151 / 1051
» Formal Methods for Privacy
Sort
View
99
Voted
MOC
2010
14 years 10 months ago
A numerical method for fractal conservation laws
: We consider a fractal scalar conservation law, that is to say a conservation law modified by a fractional power of the Laplace operator, and we propose a numerical method to appr...
Jérôme Droniou
111
Voted
SP
2002
IEEE
103views Security Privacy» more  SP 2002»
15 years 3 months ago
Methods and Limitations of Security Policy Reconciliation
A security policy specifies session participant requirements. However, existing frameworks provide limited facilities for the automated reconciliation of participant policies. Thi...
Patrick Drew McDaniel, Atul Prakash
136
Voted
MOC
2010
14 years 10 months ago
Sharpness in rates of convergence for the symmetric Lanczos method
The Lanczos method is often used to solve a large and sparse symmetric matrix eigenvalue problem. There is a well-established convergence theory that produces bounds to predict the...
Ren-Cang Li
216
Voted
ICDE
2005
IEEE
167views Database» more  ICDE 2005»
16 years 4 months ago
Privacy and Ownership Preserving of Outsourced Medical Data
The demand for the secondary use of medical data is increasing steadily to allow for the provision of better quality health care. Two important issues pertaining to this sharing o...
Elisa Bertino, Beng Chin Ooi, Yanjiang Yang, Rober...
DMIN
2006
125views Data Mining» more  DMIN 2006»
15 years 5 months ago
Privacy-Preserving Bayesian Network Learning From Heterogeneous Distributed Data
In this paper, we propose a post randomization technique to learn a Bayesian network (BN) from distributed heterogeneous data, in a privacy sensitive fashion. In this case, two or ...
Jianjie Ma, Krishnamoorthy Sivakumar