Sciweavers

5255 search results - page 369 / 1051
» Formal Methods for Privacy
Sort
View
KBSE
1999
IEEE
15 years 9 months ago
Controlled Natural Language Can Replace First-Order Logic
Many domain specialists are not familiar or comfortable with formal notations and formal tools like theorem provers or model generators. To address this problem we developed Attem...
Norbert E. Fuchs, Uta Schwertel, Sunna Torge
FOIS
2010
15 years 6 months ago
Realism for scientific ontologies
Science aims to develop an accurate understanding of reality through a variety of rigorously empirical and formal methods. Ontologies are used to formalize the meaning of terms wit...
Michel Dumontier, Robert Hoehndorf
143
Voted
WISEC
2010
ACM
15 years 2 months ago
Preventing multi-query attack in location-based services
Despite increasing popularity, Location-based Services (LBS) (e.g., searching nearby points-of-interest on map) on mobile handheld devices have been subject to major privacy conce...
Nilothpal Talukder, Sheikh Iqbal Ahamed
ICDE
2012
IEEE
202views Database» more  ICDE 2012»
13 years 7 months ago
Differentially Private Spatial Decompositions
— Differential privacy has recently emerged as the de facto standard for private data release. This makes it possible to provide strong theoretical guarantees on the privacy and ...
Graham Cormode, Cecilia M. Procopiuc, Divesh Sriva...
128
Voted
RTA
1987
Springer
15 years 8 months ago
Completion for Rewriting Modulo a Congruence
We present completion methods for rewriting modulo a congruence, generalizing previous methods by Peterson and Stickel (1981) and Jouannaud and Kirchner (1986). We formalize our me...
Leo Bachmair, Nachum Dershowitz