Sciweavers

433 search results - page 21 / 87
» Administrative and Public Verifiability: Can We Have Both
Sort
View
SIGMOD
2008
ACM
144views Database» more  SIGMOD 2008»
14 years 7 months ago
Preservation of proximity privacy in publishing numerical sensitive data
We identify proximity breach as a privacy threat specific to numerical sensitive attributes in anonymized data publication. Such breach occurs when an adversary concludes with hig...
Jiexing Li, Yufei Tao, Xiaokui Xiao
ETS
2000
IEEE
220views Hardware» more  ETS 2000»
13 years 7 months ago
Law On-Line: A Collaborative, Web-Based Journey in the Law and Social Sciences
During Spring 1998, we embarked on pedagogical journey into unknown terrains -- the terrains of collaborative teaching and World Wide Web instruction. In this paper we present a j...
Cynthia L. Cates, Wayne V. McIntosh
DIS
2006
Springer
13 years 11 months ago
Scientific Discovery: A View from the Trenches
One of the primary goals in discovery science is to understand the human scientific reasoning processes. Despite sporadic success of automated discovery systems, few studies have s...
Catherine Blake, Meredith Rendall
TMM
2008
85views more  TMM 2008»
13 years 7 months ago
Optimal Coding of Multilayer and Multiversion Video Streams
Abstract--Traditional video servers partially cope with heterogeneous client populations by maintaining a few versions of the same stream with different bit rates. More recent vide...
Cheng-Hsin Hsu, Mohamed Hefeeda
CONCUR
2007
Springer
14 years 1 months ago
A Marriage of Rely/Guarantee and Separation Logic
Abstract. In the quest for tractable methods for reasoning about concurrent algorithms both rely/guarantee logic and separation logic have made great advances. They both seek to ta...
Viktor Vafeiadis, Matthew J. Parkinson