Sciweavers

642 search results - page 40 / 129
» Roles Versus Classes
Sort
View
205
Voted
ICDE
2007
IEEE
115views Database» more  ICDE 2007»
16 years 2 months ago
Preservation Of Patterns and Input-Output Privacy
Abstract breaches. To do so, the data custodian needs to transform its data. To determine the appropriate transforPrivacy preserving data mining so far has mainly mation, there are...
Shaofeng Bu, Laks V. S. Lakshmanan, Raymond T. Ng,...
97
Voted
WWW
2008
ACM
16 years 1 months ago
Secure or insure?: a game-theoretic analysis of information security games
Despite general awareness of the importance of keeping one's system secure, and widespread availability of consumer security technologies, actual investment in security remai...
Jens Grossklags, Nicolas Christin, John Chuang
98
Voted
DAGSTUHL
1997
15 years 2 months ago
Ray-Based Data Level Comparisons of Direct Volume Rendering Algorithms
This paper describes and demonstrates the e ectiveness of several metrics for data level comparison of direct volume rendering (DVR) algorithms. The focus is not on speed ups from...
Kwansik Kim, Alex Pang
97
Voted
ALT
2003
Springer
15 years 10 months ago
Intrinsic Complexity of Uniform Learning
Inductive inference is concerned with algorithmic learning of recursive functions. In the model of learning in the limit a learner successful for a class of recursive functions mus...
Sandra Zilles
80
Voted
METRICS
2003
IEEE
15 years 6 months ago
Design Patterns and Change Proneness: An Examination of Five Evolving Systems
Design patterns are recognized, named solutions to common design problems. The use of the most commonly referenced design patterns should promote adaptable and reusable program co...
James M. Bieman, Greg Straw, Huxia Wang, P. Willar...