Sciweavers

8266 search results - page 85 / 1654
» Information About the Journal
Sort
View
KDD
2008
ACM
162views Data Mining» more  KDD 2008»
16 years 9 days ago
Composition attacks and auxiliary information in data privacy
Privacy is an increasingly important aspect of data publishing. Reasoning about privacy, however, is fraught with pitfalls. One of the most significant is the auxiliary informatio...
Srivatsava Ranjit Ganta, Shiva Prasad Kasiviswanat...
CSFW
2005
IEEE
15 years 5 months ago
Belief in Information Flow
To reason about information flow based on beliefs, a new model is developed that describes how attacker beliefs change due to the attacker’s observation of the execution of a p...
Michael R. Clarkson, Andrew C. Myers, Fred B. Schn...
CSFW
2003
IEEE
15 years 5 months ago
Anonymity and Information Hiding in Multiagent Systems
We provide a framework for reasoning about information-hiding requirements in multiagent systems and for reasoning about anonymity in particular. Our framework employs the modal l...
Joseph Y. Halpern, Kevin R. O'Neill
CAISE
2003
Springer
15 years 5 months ago
Extending an on-line information site with accurate domain-dependent extracts from the World Wide Web
This paper describes a new procedure that has been developed for extending an existing on-line information system about The Voyages of the Beagle with information collected automat...
Enrique Alfonseca, Pilar Rodríguez
AAAI
1998
15 years 1 months ago
Recommendation as Classification: Using Social and Content-Based Information in Recommendation
Recommendationsystems makesuggestions about artifacts to a user. For instance, they maypredict whether a user wouldbe interested in seeing a particular movie. Social recomendation...
Chumki Basu, Haym Hirsh, William W. Cohen