Sciweavers

150 search results - page 16 / 30
» Obtaining and Evaluating Generalized Association Rules
Sort
View
KDD
2004
ACM
160views Data Mining» more  KDD 2004»
15 years 10 months ago
k-TTP: a new privacy model for large-scale distributed environments
Secure multiparty computation allows parties to jointly compute a function of their private inputs without revealing anything but the output. Theoretical results [2] provide a gen...
Bobi Gilburd, Assaf Schuster, Ran Wolff
DASFAA
2007
IEEE
163views Database» more  DASFAA 2007»
15 years 4 months ago
Protecting Individual Information Against Inference Attacks in Data Publishing
In many data-publishing applications, the data owner needs to protect sensitive information pertaining to individuals. Meanwhile, certain information is required to be published. T...
Chen Li, Houtan Shirani-Mehr, Xiaochun Yang
DESRIST
2009
Springer
100views Education» more  DESRIST 2009»
15 years 2 months ago
A theory-based alternative for the design of instruction: functional design
An approach to instructional design is described which avoids some of the problems traditionally associated with process design models, sometimes referred to as waterfall models. ...
Andrew S. Gibbons
TACS
1994
Springer
15 years 1 months ago
An Operational Approach to Combining Classical Set Theory and Functional Programming Languages
Abstract. We have designed a programming logic based on an integration of functional programming languages with classical set theory. The logic merges a classical view of equality ...
Douglas J. Howe, Scott D. Stoller
79
Voted
FCT
2007
Springer
15 years 1 months ago
Productivity of Stream Definitions
We give an algorithm for deciding productivity of a large and natural class of recursive stream definitions. A stream definition is called `productive' if it can be evaluated ...
Jörg Endrullis, Clemens Grabmayer, Dimitri He...