Sciweavers

1779 search results - page 166 / 356
» A Formal Model of Data Privacy
Sort
View
AMW
2011
14 years 8 months ago
Private Database Synthesis for Outsourced System Evaluation
The goal of this paper is to permit secure outsourced system evaluation. We propose a method for generating synthetic databases and obfuscating a workload of queries in order to pr...
Vani Gupta, Gerome Miklau, Neoklis Polyzotis
AUSDM
2008
Springer
229views Data Mining» more  AUSDM 2008»
15 years 6 months ago
Minors as Miners - Modelling and Evaluating Ontological and Linguistic Learning
Growing up is in large measure learning about the world and our social and linguistic environment. We might call this data mining, although it is far more multimodal and immersive...
David M. W. Powers
AUTOID
2005
IEEE
15 years 10 months ago
Guidelines for Appropriate Use of Simulated Data for Bio-Authentication Research
In this paper, we outline a framework for appropriate and proper usage of simulated data for biometric authentication. Currently, there are no formal guidelines concerning the use...
Yan Ma, Michael E. Schuckers, Bojan Cukic
ROOM
2000
15 years 6 months ago
Checking the Consistency of UML Class Diagrams Using Larch Prover
The Unified Modeling Language (UML) has been designed to be a full standard notation for Object-Oriented Modelling. UML is a rather complete set of notations, but it lacks of form...
Pascal André, Annya Romanczuk, Jean-Claude ...
FCT
2007
Springer
15 years 10 months ago
A String-Based Model for Simple Gene Assembly
Abstract. The simple intramolecular model for gene assembly in ciliates is particularly interesting because it can predict the correct assembly of all available experimental data, ...
Robert Brijder, Miika Langille, Ion Petre