Sciweavers

502 search results - page 39 / 101
» An Audit Logic for Accountability
Sort
View
WWW
2006
ACM
14 years 8 months ago
The web structure of e-government - developing a methodology for quantitative evaluation
In this paper we describe preliminary work that examines whether statistical properties of the structure of websites can be an informative measure of their quality. We aim to deve...
Vaclav Petricek, Tobias Escher, Ingemar J. Cox, He...
KDD
2006
ACM
191views Data Mining» more  KDD 2006»
14 years 8 months ago
Beyond classification and ranking: constrained optimization of the ROI
Classification has been commonly used in many data mining projects in the financial service industry. For instance, to predict collectability of accounts receivable, a binary clas...
Lian Yan, Patrick Baldasare
NDSS
2003
IEEE
14 years 1 months ago
Proactive Two-Party Signatures for User Authentication
We study proactive two-party signature schemes in the context of user authentication. A proactive two-party signature scheme (P2SS) allows two parties—the client and the serverâ...
Antonio Nicolosi, Maxwell N. Krohn, Yevgeniy Dodis...
CAISE
2008
Springer
13 years 9 months ago
Validation of UML Conceptual Schemas with Operations
The purpose of validating a conceptual schema is to check whether it specifies what the designer intended. Our approach to validation consists in translating the schema into logic ...
Anna Queralt, Ernest Teniente
CVPR
2006
IEEE
14 years 9 months ago
Reconstruction with Interval Constraints Propagation
In this paper we demonstrate how Interval Analysis and Constraint Logic Programming can be used to obtain an accurate geometric model of a scene that rigorously takes into account...
Michela Farenzena, Andrea Fusiello, Agostino Dovie...