Sciweavers

5255 search results - page 269 / 1051
» Formal Methods for Privacy
Sort
View
EDBT
2010
ACM
237views Database» more  EDBT 2010»
15 years 11 months ago
BronzeGate: real-time transactional data obfuscation for GoldenGate
Data privacy laws have appeared recently, such as the HIPAA laws for protecting medical records, and the PCI guidelines for protecting Credit Card information. Data privacy can be...
Shenoda Guirguis, Alok Pareek
ARITH
2001
IEEE
15 years 8 months ago
Leading Zero Anticipation and Detection-A Comparison of Methods
Design of the leading zero anticipator ( L a ) or detector (LZD) is pivotal to the normalization of results for addition and fused multiplication-addition in highperjormance float...
Martin S. Schmookler, Kevin J. Nowka
ICSE
2001
IEEE-ACM
15 years 9 months ago
State, Event, Time and Diagram in System Modeling
The design of complex systems requires powerful mechanisms for modeling state, concurrent events, and real-time behavior; as well as for visualising and structuring systems in ord...
Jin Song Dong
ISI
2004
Springer
15 years 9 months ago
Spatial Forecast Methods for Terrorist Events in Urban Environments
Abstract. Terrorist events such as suicide bombings are rare yet extremely destructive events. Responses to such events are even rarer, because they require forecasting methods for...
Donald Brown, Jason Dalton, Heidi Hoyle
ADMA
2008
Springer
114views Data Mining» more  ADMA 2008»
15 years 10 months ago
Using Data Mining Methods to Predict Personally Identifiable Information in Emails
Private information management and compliance are important issues nowadays for most of organizations. As a major communication tool for organizations, email is one of the many pot...
Liqiang Geng, Larry Korba, Xin Wang, Yunli Wang, H...