Sciweavers

2705 search results - page 487 / 541
» Privacy in Data Mining Using Formal Methods
Sort
View
IFL
2003
Springer
167views Formal Methods» more  IFL 2003»
15 years 7 months ago
A Functional Shell That Dynamically Combines Compiled Code
Abstract. We present a new shell that provides the full basic functionality of a strongly typed lazy functional language, including overloading. The shell can be used for manipulat...
Arjen van Weelden, Rinus Plasmeijer
CCS
2004
ACM
15 years 7 months ago
Payload attribution via hierarchical bloom filters
Payload attribution is an important problem often encountered in network forensics. Given an excerpt of a payload, finding its source and destination is useful for many security ...
Kulesh Shanmugasundaram, Hervé Brönnim...
127
Voted
ACISP
2001
Springer
15 years 6 months ago
Private Information Retrieval Based on the Subgroup Membership Problem
Abstract. Many algorithmic problems, which are used to prove the security of a cryptographic system, are shown to be characterized as the subgroup membership problem. We then apply...
Akihiro Yamamura, Taiichi Saito
116
Voted
KR
2004
Springer
15 years 7 months ago
Knowledge Discovery by Reversing Inductive Knowledge Representation
In a very basic sense, the aim of knowledge discovery is to reveal structures of knowledge which can be seen as being represented by structural relationships. In this paper, we ma...
Gabriele Kern-Isberner, Jens Fisseler
CSE
2009
IEEE
15 years 8 months ago
Improving Interobserver Reliability by Artificial Intelligence Techniques in Behavioural Research
Interobserver reliability and reproducibility are well known problems in experimental research within the social and behavioural sciences. We propose the use of formal techniques ...
Arjen van Alphen, Tibor Bosse, Catholijn M. Jonker...