Sciweavers

5344 search results - page 183 / 1069
» Privacy-Preserving Set Operations
Sort
View
117
Voted
SAIG
2000
Springer
15 years 7 months ago
Multi-Stage Imperative Languages: A Conservative Extension Result
Abstract. This paper extends the recent work [CMT00] on the operational semantics and type system for a core language, called MiniMLBN ref , which exploits the notion of closed typ...
Cristiano Calcagno, Eugenio Moggi
USENIX
2008
15 years 5 months ago
Automatic Optimization of Parallel Dataflow Programs
Large-scale parallel dataflow systems, e.g., Dryad and Map-Reduce, have attracted significant attention recently. High-level dataflow languages such as Pig Latin and Sawzall are b...
Christopher Olston, Benjamin Reed, Adam Silberstei...
USS
2008
15 years 5 months ago
Exploitable Redirects on the Web: Identification, Prevalence, and Defense
Web sites on the Internet often use redirection. Unfortunately, without additional security, many of the redirection links can be manipulated and abused to mask phishing attacks. ...
Craig A. Shue, Andrew J. Kalafut, Minaxi Gupta
EUSFLAT
2007
185views Fuzzy Logic» more  EUSFLAT 2007»
15 years 4 months ago
Dominance of Ordinal Sums of TL and TP
Dominance is a relation on operations which are defined on a common poset. We treat the dominance relation on the set of ordinal sum t-norms which involve either exclusively the ...
Susanne Saminger, Peter Sarkoci
NIPS
2004
15 years 4 months ago
Distributed Information Regularization on Graphs
We provide a principle for semi-supervised learning based on optimizing the rate of communicating labels for unlabeled points with side information. The side information is expres...
Adrian Corduneanu, Tommi Jaakkola