Sciweavers

5255 search results - page 374 / 1051
» Formal Methods for Privacy
Sort
View
FUIN
2006
128views more  FUIN 2006»
15 years 5 months ago
A Rewriting Framework for Rule-Based Programming Dynamic Applications
In recent years light-weighted formal methods are of growing interest in construction and analysis of complex concurrent software system. A new rule-action based term rewriting fr...
Anatoly E. Doroshenko, Ruslan Shevchenko
SBMF
2010
Springer
205views Formal Methods» more  SBMF 2010»
14 years 11 months ago
A High-Level Language for Modeling Algorithms and Their Properties
Designers of concurrent and distributed algorithms usually express them using pseudo-code. In contrast, most verification techniques are based on more mathematically-oriented forma...
Sabina Akhtar, Stephan Merz, Martin Quinson
VLDB
2005
ACM
136views Database» more  VLDB 2005»
15 years 10 months ago
On k-Anonymity and the Curse of Dimensionality
In recent years, the wide availability of personal data has made the problem of privacy preserving data mining an important one. A number of methods have recently been proposed fo...
Charu C. Aggarwal
128
Voted
DGO
2004
124views Education» more  DGO 2004»
15 years 6 months ago
Data Confidentiality, Data Quality and Data Integration for Federal Databases
cipal high-level goal of the research is to develop abstractions, theory and methodology and software tools that allow federal statistical agencies to disseminate useful informatio...
Alan F. Karr
HOST
2008
IEEE
15 years 11 months ago
Hardware Trojan Detection Using Path Delay Fingerprint
—Trusted IC design is a recently emerged topic since fabrication factories are moving worldwide in order to reduce cost. In order to get a low-cost but effective hardware Trojan ...
Yier Jin, Yiorgos Makris