Sciweavers

341 search results - page 47 / 69
» The way forward
Sort
View
ECIS
2003
15 years 1 months ago
Using online services in untrusted environments: a privacy-preserving architecture
While online service providers are sometimes accused of forwarding identifying customer information as name and address to untrusted third parties, comparatively little attention ...
Claus Boyens, Oliver Günther
FIMI
2003
88views Data Mining» more  FIMI 2003»
15 years 1 months ago
A fast APRIORI implementation
The efficiency of frequent itemset mining algorithms is determined mainly by three factors: the way candidates are generated, the data structure that is used and the implementati...
Ferenc Bodon
SIROCCO
2004
15 years 1 months ago
Long-Lived Rambo: Trading Knowledge for Communication
Shareable data services providing consistency guarantees, such as atomicity (linearizability), make building distributed systems easier. However, combining linearizability with ef...
Chryssis Georgiou, Peter M. Musial, Alexander A. S...
CSL
2010
Springer
15 years 27 days ago
Degrees of Security: Protocol Guarantees in the Face of Compromising Adversaries
Abstract. We present a symbolic framework, based on a modular operational semantics, for formalizing different notions of compromise relevant for the analysis of cryptographic prot...
David A. Basin, Cas J. F. Cremers
GG
2008
Springer
15 years 26 days ago
Pattern-Based Model-to-Model Transformation
We present a new, high-level approach for the specification of model-to-model transformations based on declarative patterns. These are (atomic or composite) constraints on triple ...
Juan de Lara, Esther Guerra