Sciweavers

1779 search results - page 113 / 356
» A Formal Model of Data Privacy
Sort
View
CCS
2007
ACM
15 years 10 months ago
Fuzzy extractors for continuous distributions
We show that there is a direct relation between the maximum length of the keys extracted from biometric data and the error rates of the biometric system. The length of the bio-key...
Ileana Buhan, Jeroen Doumen, Pieter H. Hartel, Ray...
ER
1995
Springer
152views Database» more  ER 1995»
15 years 8 months ago
A Logic Framework for a Semantics of Object-Oriented Data Modeling
We describe a (meta) formalism for defining a variety of (object oriented) data models in a unified framework based on a variation of first-order logic. As specific example we use...
Olga De Troyer, Robert Meersman
IJON
2008
98views more  IJON 2008»
15 years 4 months ago
Factorisation and denoising of 0-1 data: A variational approach
Presence-absence (0-1) observations are special in that often the absence of evidence is not evidence of absence. Here we develop an independent factor model, which has the unique...
Ata Kabán, Ella Bingham
IRI
2005
IEEE
15 years 10 months ago
Modeling methodology for application development in petroleum industry
The development of applications for monitoring, control, simulation and diagnosis in the petroleum industry involves a multitude of complex software tools. These tools have their ...
Cong Zhang, Viktor K. Prasanna, Abdollah Orangi, W...
STORAGESS
2005
ACM
15 years 10 months ago
Security of erasable memories against adaptive adversaries
We study cryptographic modeling and encryption-based design techniques for guaranteeing privacy of data that is first stored in some type of computer memory and then deleted. We ...
Giovanni Di Crescenzo