Sciweavers

130 search results - page 19 / 26
» Learning to Trust
Sort
View
TCC
2005
Springer
102views Cryptology» more  TCC 2005»
15 years 2 months ago
Toward Privacy in Public Databases
Abstract. We initiate a theoretical study of the census problem. Informally, in a census individual respondents give private information to a trusted party (the census bureau), who...
Shuchi Chawla, Cynthia Dwork, Frank McSherry, Adam...
EXACT
2007
14 years 11 months ago
PML 2: A Modular Explanation Interlingua
In the past five years, we have designed and evolved an interlingua for sharing explanations generated by various automated systems such as hybrid web-based question answering sys...
Deborah L. McGuinness, Li Ding, Paulo Pinheiro da ...
P2PKM
2004
14 years 10 months ago
RDFGrowth, a P2P annotation exchange algorithm for scalable Semantic Web applications
We present RDFGrowth, an algorithm that addresses a specific yet important scenario: large scale, end user targeted, metadata exchange P2P applications. In this scenario, peers per...
Giovanni Tummarello, Christian Morbidoni, Joackin ...
OTM
2010
Springer
14 years 7 months ago
Using Real Option Thinking to Improve Decision Making in Security Investment
Making well-founded security investment decisions is hard: several alternatives may need to be considered, the alternatives’ space is often diffuse, and many decision parameters...
Virginia N. L. Franqueira, Siv Hilde Houmb, Maya D...
CCS
2010
ACM
15 years 1 months ago
Controlling data disclosure in computational PIR protocols
Private Information Retrieval (PIR) protocols allow users to learn data items stored at a server which is not fully trusted, without disclosing to the server the particular data e...
Ning Shang, Gabriel Ghinita, Yongbin Zhou, Elisa B...