Sciweavers

1779 search results - page 228 / 356
» A Formal Model of Data Privacy
Sort
View
OOPSLA
2010
Springer
15 years 2 months ago
Composable specifications for structured shared-memory communication
In this paper we propose a communication-centric approach to specifying and checking how multithreaded programs use shared memory to perform inter-thread communication. Our approa...
Benjamin P. Wood, Adrian Sampson, Luis Ceze, Dan G...
CCS
2011
ACM
14 years 4 months ago
Proofs of ownership in remote storage systems
Cloud storage systems are becoming increasingly popular. A promising technology that keeps their cost down is deduplication, which stores only a single copy of repeating data. Cli...
Shai Halevi, Danny Harnik, Benny Pinkas, Alexandra...
CIKM
2007
Springer
15 years 10 months ago
Reusing relational sources for semantic information access
The rapid growth of available data arises the need for more sophisticated techniques for semantic access to information. It has been proved that using conceptual model or ontology...
Lina Lubyte
WKDD
2010
CPS
217views Data Mining» more  WKDD 2010»
15 years 11 months ago
Two-round Multi-Party Contract Signing
—A multi-party contract signing (MPCS) protocol allows a set of parties to exchange messages with each other to reach a state in which either each of them has a pre-agreed contra...
Xiangdong Li, Qiusheng Zheng
UAI
2004
15 years 5 months ago
Robustness of Causal Claims
A causal claim is any assertion that invokes causal relationships between variables, for example, that a drug has a certain e ect on preventing a disease. Causal claims are establ...
Judea Pearl