Sciweavers

1017 search results - page 37 / 204
» A General Model for Authenticated Data Structures
Sort
View
BDIM
2008
IEEE
205views Business» more  BDIM 2008»
14 years 3 months ago
Mining semantic relations using NetFlow
—Knowing the dependencies among computing assets and services provides insights into the computing and business landscape, therefore, facilitating low-risk timely changes in supp...
Alexandru Caracas, Andreas Kind, Dieter Gantenbein...
CCS
2004
ACM
14 years 2 months ago
Reusable cryptographic fuzzy extractors
We show that a number of recent definitions and constructions of fuzzy extractors are not adequate for multiple uses of the same fuzzy secret—a major shortcoming in the case of...
Xavier Boyen
UAI
2000
13 years 10 months ago
Utilities as Random Variables: Density Estimation and Structure Discovery
Decision theory does not traditionally include uncertainty over utility functions. We argue that the a person's utility value for a given outcome can be treated as we treat o...
Urszula Chajewska, Daphne Koller
ICDE
2010
IEEE
258views Database» more  ICDE 2010»
14 years 3 months ago
Anonymized Data: Generation, models, usage
Data anonymization techniques have been the subject of intense investigation in recent years, for many kinds of structured data, including tabular, item set and graph data. They e...
Graham Cormode, Divesh Srivastava
DOLAP
2004
ACM
14 years 2 months ago
Physical modeling of data warehouses using UML
During the few last years, several approaches have been proposed to model different aspects of a Data Warehouse (DW), such as the conceptual model of the DW, the design of the ET...
Sergio Luján-Mora, Juan Trujillo