Sciweavers

1779 search results - page 253 / 356
» A Formal Model of Data Privacy
Sort
View
CCS
2009
ACM
15 years 11 months ago
Keep your friends close: the necessity for updating an anomaly sensor with legitimate environment changes
Large-scale distributed systems have dense, complex code-bases that are assumed to perform multiple and inter-dependent tasks while user interaction is present. The way users inte...
Angelos Stavrou, Gabriela F. Cretu-Ciocarlie, Mich...
CCS
2007
ACM
15 years 10 months ago
Managing RBAC states with transitive relations
In this paper, we study the maintenance of role-based access control (RBAC) models in database environments using transitive closure relations. In particular, the algorithms that ...
Chaoyi Pang, David P. Hansen, Anthony J. Maeder
ISKI
1994
15 years 8 months ago
Evolution towards, in, and beyond Object Databases
There is a manifold of meanings we could associate with the term \evolution" in the database arena. This paper tries to categorize some of these into a unique framework, showi...
Marc H. Scholl, Markus Tresch
ITCC
2002
IEEE
15 years 9 months ago
Mask and Multiple Format: Two Notions for a Progressive and Adapted Access to Information
This paper introduces the notions of mask and multiple format for setting up a progressive access to information in an Information System. Masks consist of more or less complete r...
Marlène Villanova-Oliver, Jérô...
129
Voted
COLT
2006
Springer
15 years 7 months ago
Discriminative Learning Can Succeed Where Generative Learning Fails
Generative algorithms for learning classifiers use training data to separately estimate a probability model for each class. New items are classified by comparing their probabiliti...
Philip M. Long, Rocco A. Servedio