Sciweavers

239 search results - page 17 / 48
» Accountable Privacy
Sort
View
TRUSTBUS
2009
Springer
14 years 5 months ago
A Formalization of HIPAA for a Medical Messaging System
Abstract. The complexity of regulations in healthcare, financial services, and other industries makes it difficult for enterprises to design and deploy effective compliance syste...
Peifung E. Lam, John C. Mitchell, Sharada Sundaram
AGENTS
1999
Springer
14 years 3 months ago
An Adaptive Agent Bidding Strategy Based on Stochastic Modeling
For a dynamic, evolving multiagent auction, we have developed an adaptive agent bidding strategy (called the p-strategy) based on stochastic modeling. The p-strategy takes into ac...
Sunju Park, Edmund H. Durfee, William P. Birmingha...
MOC
2010
13 years 5 months ago
Optimizing the double description method for normal surface enumeration
Abstract. Many key algorithms in 3-manifold topology involve the enumeration of normal surfaces, which is based upon the double description method for finding the vertices of a con...
Benjamin A. Burton
SP
2010
IEEE
204views Security Privacy» more  SP 2010»
13 years 5 months ago
Acceleration of a CFD code with a GPU
The Computational Fluid Dynamics code Overflow includes as one of its solver options an algorithm which is a fairly small piece of code but which accounts for a significant portio...
Dennis C. Jespersen
WWW
2010
ACM
13 years 11 months ago
Anonymizing user profiles for personalized web search
We study the problem of anonymizing user profiles so that user privacy is sufficiently protected while the anonymized profiles are still effective in enabling personalized web sea...
Yun Zhu, Li Xiong, Christopher Verdery