Sciweavers

184 search results - page 26 / 37
» A TMDM Disclosure Using T
Sort
View
ESEC
1997
Springer
13 years 11 months ago
Cryptographic Verification of Test Coverage Claims
The market for software components is growing, driven on the "demand side" by the need for rapid deployment of highly functional products, and on the "supply side&q...
Premkumar T. Devanbu, Stuart G. Stubblebine
VLDB
2005
ACM
114views Database» more  VLDB 2005»
14 years 1 months ago
Checking for k-Anonymity Violation by Views
When a private relational table is published using views, secrecy or privacy may be violated. This paper uses a formally-defined notion of k-anonymity to measure disclosure by vi...
Chao Yao, Xiaoyang Sean Wang, Sushil Jajodia
ADC
2006
Springer
125views Database» more  ADC 2006»
13 years 11 months ago
A reconstruction-based algorithm for classification rules hiding
Data sharing between two organizations is common in many application areas e.g. business planing or marketing. Useful global patterns can be discovered from the integrated dataset...
Juggapong Natwichai, Xue Li, Maria E. Orlowska
IMC
2007
ACM
13 years 9 months ago
Understanding passive and active service discovery
Increasingly, network operators do not directly operate computers on their network, yet are responsible for assessing network vulnerabilities to ensure compliance with policies ab...
Genevieve Bartlett, John S. Heidemann, Christos Pa...
BMCBI
2006
45views more  BMCBI 2006»
13 years 7 months ago
A simple spreadsheet-based, MIAME-supportive format for microarray data: MAGE-TAB
Background: Sharing of microarray data within the research community has been greatly facilitated by the development of the disclosure and communication standards MIAME and MAGEML...
Tim F. Rayner, Philippe Rocca-Serra, Paul T. Spell...