Sciweavers

2165 search results - page 374 / 433
» cases 2005
Sort
View
AMC
2007
102views more  AMC 2007»
14 years 9 months ago
Existence and computation of short-run equilibria in economic geography
The new economic geography literature provides a general equilibrium framework that explains the emergence of economic agglomerations as a trade-off between increasing returns at...
Nicos G. Pavlidis, Michael N. Vrahatis, P. Mossay
CRYPTO
2012
Springer
223views Cryptology» more  CRYPTO 2012»
13 years 4 days ago
Collusion-Preserving Computation
In collusion-free protocols, subliminal communication is impossible and parties are thus unable to communicate “any information beyond what the protocol allows”. Collusion-fre...
Joël Alwen, Jonathan Katz, Ueli Maurer, Vassi...
SOUPS
2005
ACM
15 years 3 months ago
Stopping spyware at the gate: a user study of privacy, notice and spyware
Spyware is a significant problem for most computer users. The term “spyware” loosely describes a new class of computer software. This type of software may track user activitie...
Nathaniel Good, Rachna Dhamija, Jens Grossklags, D...
DSS
2006
140views more  DSS 2006»
14 years 9 months ago
Access control and audit model for the multidimensional modeling of data warehouses
Due to the sensitive data contained in Data Warehouses (DW), it is essential to specify security measures from the early stages of the DW design and enforce them. Traditional acce...
Eduardo Fernández-Medina, Juan Trujillo, Ro...
81
Voted
CVPR
2005
IEEE
15 years 11 months ago
Discriminant Analysis with Tensor Representation
In this paper, we present a novel approach to solving the supervised dimensionality reduction problem by encoding an image object as a general tensor of 2nd or higher order. First...
Shuicheng Yan, Dong Xu, Qiang Yang, Lei Zhang, Xia...