Sciweavers

14824 search results - page 2640 / 2965
» Security - Introduction
Sort
View
OOPSLA
2009
Springer
15 years 8 months ago
An exploration of program as language
In this paper we explore the idea that the code that constitutes a program actually forms a higher-level, program specific language. The symbols of the language are the abstracti...
Elisa L. A. Baniassad, Clayton G. Myers
OOPSLA
2009
Springer
15 years 8 months ago
Agile anthropology and Alexander's architecture: an essay in three voices
During its formative decades the software community looked twice to the theories of ChristopherAlexander for inspiration, both times failing to completely master the architect’s...
Jenny Quillien, Pam Rostal, Dave West
OOPSLA
2009
Springer
15 years 8 months ago
MT-scribe: a tool for recording and inferring model transformations
The traditional model transformation approach is to write transformation programs in a specialized language. Although such languages provide powerful capabilities to automate mode...
Yu Sun, Jeff Gray, Jules White
125
Voted
PAKDD
2009
ACM
225views Data Mining» more  PAKDD 2009»
15 years 8 months ago
Accurate Synthetic Generation of Realistic Personal Information
A large proportion of the massive amounts of data that are being collected by many organisations today is about people, and often contains identifying information like names, addre...
Peter Christen, Agus Pudjijono
ASIACRYPT
2001
Springer
15 years 8 months ago
Key-Privacy in Public-Key Encryption
We consider a novel security requirement of encryption schemes that we call “key-privacy” or “anonymity”. It asks that an eavesdropper in possession of a ciphertext not be ...
Mihir Bellare, Alexandra Boldyreva, Anand Desai, D...
« Prev « First page 2640 / 2965 Last » Next »