Sciweavers

10689 search results - page 1880 / 2138
» How informances can be used in design ethnography
Sort
View
ICDE
2010
IEEE
258views Database» more  ICDE 2010»
15 years 8 months ago
Anonymized Data: Generation, models, usage
Data anonymization techniques have been the subject of intense investigation in recent years, for many kinds of structured data, including tabular, item set and graph data. They e...
Graham Cormode, Divesh Srivastava
CCS
2007
ACM
15 years 8 months ago
Memsherlock: an automated debugger for unknown memory corruption vulnerabilities
Software vulnerabilities have been the main contributing factor to the Internet security problems such as fast spreading worms. Among these software vulnerabilities, memory corrup...
Emre Can Sezer, Peng Ning, Chongkyung Kil, Jun Xu
TCC
2007
Springer
125views Cryptology» more  TCC 2007»
15 years 8 months ago
Evaluating Branching Programs on Encrypted Data
Abstract. We present a public-key encryption scheme with the following properties. Given a branching program P and an encryption c of an input x, it is possible to efficiently com...
Yuval Ishai, Anat Paskin
142
Voted
ACCV
2006
Springer
15 years 7 months ago
Dense Motion and Disparity Estimation Via Loopy Belief Propagation
We describe a method for computing a dense estimate of motion and disparity, given a stereo video sequence containing moving non-rigid objects. In contrast to previous approaches, ...
Michael Isard, John MacCormick
ADBIS
2005
Springer
147views Database» more  ADBIS 2005»
15 years 7 months ago
Declarative Data Fusion - Syntax, Semantics, and Implementation
In today’s integrating information systems data fusion, i.e., the merging of multiple tuples about the same real-world object into a single tuple, is left to ETL tools and other ...
Jens Bleiholder, Felix Naumann
« Prev « First page 1880 / 2138 Last » Next »