Sciweavers

6164 search results - page 1112 / 1233
» Teaching Computer Security
Sort
View
ICDE
2008
IEEE
498views Database» more  ICDE 2008»
17 years 3 months ago
Injector: Mining Background Knowledge for Data Anonymization
Existing work on privacy-preserving data publishing cannot satisfactorily prevent an adversary with background knowledge from learning important sensitive information. The main cha...
Tiancheng Li, Ninghui Li

Book
3101views
17 years 2 months ago
Steven Shreve: Stochastic Calculus and Finance
This is a great draft book about stochastic calculus and finance. It covers large number of topics such as Introduction to Probability Theory, Conditional Expectation, Arbitrage Pr...
Prasad Chalasani, Somesh Jha
ICML
2009
IEEE
16 years 4 months ago
Multi-assignment clustering for Boolean data
Conventional clustering methods typically assume that each data item belongs to a single cluster. This assumption does not hold in general. In order to overcome this limitation, w...
Andreas P. Streich, Mario Frank, David A. Basin, J...
111
Voted
WWW
2005
ACM
16 years 4 months ago
Duplicate detection in click streams
We consider the problem of finding duplicates in data streams. Duplicate detection in data streams is utilized in various applications including fraud detection. We develop a solu...
Ahmed Metwally, Divyakant Agrawal, Amr El Abbadi
STOC
2009
ACM
91views Algorithms» more  STOC 2009»
16 years 4 months ago
Inaccessible entropy
We put forth a new computational notion of entropy, which measures the (in)feasibility of sampling high entropy strings that are consistent with a given protocol. Specifically, we...
Iftach Haitner, Omer Reingold, Salil P. Vadhan, Ho...
« Prev « First page 1112 / 1233 Last » Next »