Sciweavers

5255 search results - page 170 / 1051
» Formal Methods for Privacy
Sort
View
130
Voted
FMCAD
2004
Springer
15 years 7 months ago
A Functional Approach to the Formal Specification of Networks on Chip
We present a functional approach, based on the ACL2 logic, for the specification of system on a chip communication architectures. Our decomposition of the communications allows the...
Julien Schmaltz, Dominique Borrione
ICFEM
1998
Springer
15 years 7 months ago
Formal Specification of CORBA Services Using Object-Z
Open component architectures, such as CORBA, allow software systems to be composed of independent components. The behavior of components is described with a mixture of an interfac...
Detlef Kreuz
141
Voted
CIA
2008
Springer
15 years 5 months ago
A Formal Approach to Aggregated Belief Formation
Abstract. This paper introduces a formal method to aggregate over basic beliefs, in order to deduce aggregated or complex beliefs as often used in applications. Complex beliefs can...
Annerieke Heuvelink, Michel C. A. Klein, Jan Treur
158
Voted
ICWS
2009
IEEE
16 years 24 days ago
Service-Oriented Architecture for Privacy-Preserving Data Mashup
Mashup is a web technology that combines information from more than one source into a single web application. This technique provides a new platform for different data providers t...
Thomas Trojer, Benjamin C. M. Fung, Patrick C. K. ...
HICSS
2009
IEEE
144views Biometrics» more  HICSS 2009»
15 years 10 months ago
Privacy Preserving Decision Tree Mining from Perturbed Data
Privacy preserving data mining has been investigated extensively. The previous works mainly fall into two categories, perturbation and randomization based approaches and secure mu...
Li Liu, Murat Kantarcioglu, Bhavani M. Thuraisingh...