Sciweavers

13026 search results - page 2231 / 2606
» Probabilistic Relational Models
Sort
View
150
Voted
HICSS
2009
IEEE
144views Biometrics» more  HICSS 2009»
15 years 12 months ago
Identity Inference as a Privacy Risk in Computer-Mediated Communication
New Web 2.0 applications, with their emphasis on collaboration and communication, hold the promise of major advances in social connectivity and coordination; however, they also in...
Sara Motahari, Sotirios G. Ziavras, Richard P. Sch...
IEEEARES
2009
IEEE
15 years 12 months ago
Accuracy: The Fundamental Requirement for Voting Systems
—There have been several attempts to develop a comprehensive account of the requirements for voting systems, particularly for public elections. Typically, these approaches identi...
Tim Storer, Russell Lock
BIRTHDAY
2009
Springer
15 years 12 months ago
A Semantical Account of Progression in the Presence of Defaults
In previous work, we proposed a modal fragment of the situation calculus called ES, which fully captures Reiter’s basic action theories. ES also has epistemic features, includin...
Gerhard Lakemeyer, Hector J. Levesque
FOSSACS
2009
Springer
15 years 12 months ago
On the Foundations of Quantitative Information Flow
There is growing interest in quantitative theories of information flow in a variety of contexts, such as secure information flow, anonymity protocols, and side-channel analysis. ...
Geoffrey Smith
146
Voted
LATA
2009
Springer
15 years 12 months ago
Termination of Priority Rewriting
Introducing priorities on rules in rewriting increases their expressive power and helps to limit computations. Priority rewriting is used in rule-based programming as well as in f...
Isabelle Gnaedig
« Prev « First page 2231 / 2606 Last » Next »