Sciweavers

6599 search results - page 1165 / 1320
» Towards a Theory of Information
Sort
View
ISW
2004
Springer
15 years 3 months ago
Model-Checking Access Control Policies
We present a model of access control which provides fine-grained data-dependent control, can express permissions about permissions, can express delegation, and can describe syste...
Dimitar P. Guelev, Mark Ryan, Pierre-Yves Schobben...
KDD
2004
ACM
159views Data Mining» more  KDD 2004»
15 years 3 months ago
Optimal randomization for privacy preserving data mining
Randomization is an economical and efficient approach for privacy preserving data mining (PPDM). In order to guarantee the performance of data mining and the protection of individ...
Michael Yu Zhu, Lei Liu
KES
2004
Springer
15 years 3 months ago
Chance Discovery with Emergence of Future Scenarios
A "chance" is an event or a situation significant for making a decision in a complex environment. Since we organized a session of Chance Discovery in KES 2000, the basic...
Yukio Ohsawa
KR
2004
Springer
15 years 3 months ago
Discovering State Invariants
We continue to advocate a methodology that we used earlier for pattern discovery through exhaustive search in selected small domains. This time we apply it to the problem of disco...
Fangzhen Lin
CHI
2010
ACM
15 years 3 months ago
Motivations to participate in online communities
A consistent theoretical and practical challenge in the design of socio-technical systems is that of motivating users to participate in and contribute to them. This study examines...
Cliff Lampe, Rick Wash, Alcides Velasquez, Elif Oz...
« Prev « First page 1165 / 1320 Last » Next »