Sciweavers

3544 search results - page 504 / 709
» Information Security in Open Systems
Sort
View
CORR
2006
Springer
79views Education» more  CORR 2006»
14 years 11 months ago
Source coding and channel requirements for unstable processes
Our understanding of information in systems has been based on the foundation of memoryless processes. Extensions to stable Markov and auto-regressive processes are classical. Berg...
Anant Sahai, Sanjoy K. Mitter
SAC
2008
ACM
14 years 10 months ago
Enhancing web service selection by QoS-based ontology and WS-policy
The Service Oriented Architecture enables the development of flexible large scale-applications in open environments by dynamically combining Web services. Nevertheless, current te...
Sodki Chaari, Youakim Badr, Frédériq...
STOC
2009
ACM
145views Algorithms» more  STOC 2009»
16 years 5 days ago
Differential privacy and robust statistics
We show by means of several examples that robust statistical estimators present an excellent starting point for differentially private estimators. Our algorithms use a new paradig...
Cynthia Dwork, Jing Lei
HICSS
2007
IEEE
134views Biometrics» more  HICSS 2007»
15 years 5 months ago
Barriers to Adoption of e-Government
Technology adoption is well defined in e-business. The environment within which leaders must act in government is significantly different that that navigated by business leaders. ...
Wm. Arthur Conklin
OOPSLA
2007
Springer
15 years 5 months ago
Towards a framework for requirement change management in healthcare software applications
Requirements volatility is an issue in software development life cycle which often originated from our incomplete knowledge about the domain of interest. In this paper, we propose...
Arash Shaban-Nejad, Volker Haarslev