Sciweavers

5255 search results - page 183 / 1051
» Formal Methods for Privacy
Sort
View
160
Voted
JAMIA
2011
140views more  JAMIA 2011»
14 years 6 months ago
Never too old for anonymity: a statistical standard for demographic data sharing via the HIPAA Privacy Rule
Objective Healthcare organizations must de-identify patient records before sharing data. Many organizations rely on the Safe Harbor Standard of the HIPAAPrivacy Rule, which enumer...
Bradley Malin, Kathleen Benitez, Daniel R. Masys
144
Voted
SDM
2008
SIAM
177views Data Mining» more  SDM 2008»
15 years 5 months ago
Practical Private Computation and Zero-Knowledge Tools for Privacy-Preserving Distributed Data Mining
In this paper we explore private computation built on vector addition and its applications in privacypreserving data mining. Vector addition is a surprisingly general tool for imp...
Yitao Duan, John F. Canny
123
Voted
FM
1999
Springer
107views Formal Methods» more  FM 1999»
15 years 8 months ago
A Formalization of Software Architecture
Software architecture addresses the high level specification, design and analysis of software systems. Formal models can provide essential underpinning for architectural descripti...
John Herbert, Bruno Dutertre, Robert A. Riemenschn...
127
Voted
JCPHY
2011
79views more  JCPHY 2011»
14 years 6 months ago
Stochastic Eulerian Lagrangian methods for fluid-structure interactions with thermal fluctuations
A computational approach is introduced for the study of the rheological properties of complex fluids and soft materials. The approach allows for a consistent treatment of microstr...
Paul J. Atzberger
141
Voted
ZUM
2005
Springer
136views Formal Methods» more  ZUM 2005»
15 years 9 months ago
Some Guidelines for Formal Development of Web-Based Applications in B-Method
Abstract. Web-based applications are the most common form of distributed systems that have gained a lot of attention in the past ten years. Today many of us are relying on scores o...
Abdolbaghi Rezazadeh, Michael J. Butler