Sciweavers

5255 search results - page 303 / 1051
» Formal Methods for Privacy
Sort
View
SAFECOMP
2000
Springer
15 years 8 months ago
Controlling Requirements Evolution: An Avionics Case Study
This paper presents an empirical investigation of the control of requirements evolution in an avionics safety-critical system. Metrics can be used to manage (e.g., control and pred...
Stuart Anderson, Massimo Felici
OOPSLA
1991
Springer
15 years 8 months ago
Object-Oriented Type Inference
We present a new approach to inferring types in untyped object-oriented programs with inheritance, assignments, and late binding. It guarantees that all messages are understood, a...
Jens Palsberg, Michael I. Schwartzbach
156
Voted
BIOSIG
2008
143views Biometrics» more  BIOSIG 2008»
15 years 6 months ago
A Reference Architecture for Biometric Template Protection based on Pseudo Identities
Abstract: Biometric authentication is often considered to enhance identity verification. The use of biometrics also introduces new challenges to protect the privacy of the subjects...
Jeroen Breebaart, Christoph Busch, Justine Grave, ...
ISI
2008
Springer
15 years 4 months ago
Detecting Hidden Hierarchy in Terrorist Networks: Some Case Studies
This paper provides a novel algorithm to automatically detect the hidden hierarchy in terrorist networks. The algorithm is based on centrality measures used in social network analy...
Nasrullah Memon, Henrik Legind Larsen, David L. Hi...
ISI
2008
Springer
15 years 3 months ago
Integrating Data Sources and Network Analysis Tools to Support the Fight Against Organized Crime
We discuss how methods from social network analysis could be combined with methodologies from database mediator technology and information fusion in order to give police and other ...
Luigi Ferrara, Christian Mårtenson, Pontus S...