Sciweavers

498 search results - page 70 / 100
» Being Sensitive to Uncertainty
Sort
View
DASFAA
2010
IEEE
148views Database» more  DASFAA 2010»
14 years 13 days ago
Competitive Privacy: Secure Analysis on Integrated Sequence Data
Sequence data analysis has been extensively studied in the literature. However, most previous work focuses on analyzing sequence data from a single source or party. In many applica...
Raymond Chi-Wing Wong, Eric Lo
ICDCS
1998
IEEE
14 years 11 days ago
A Mechanism for Establishing Policies for Electronic Commerce
This paper introduces a mechanism for establishing policies for electronic commerce in a uni ed and secure manner. A commercial policy can be viewed as the embodiment of a contrac...
Naftaly H. Minsky, Victoria Ungureanu
PAKDD
1999
ACM
113views Data Mining» more  PAKDD 1999»
14 years 11 days ago
Characterization of Default Knowledge in Ripple Down Rules Method
Abstract. \Ripple Down Rules (RDR)" Method is one of the promising approaches to directly acquire and encode knowledge from human experts. It requires data to be supplied incr...
Takuya Wada, Tadashi Horiuchi, Hiroshi Motoda, Tak...
VLDB
1994
ACM
114views Database» more  VLDB 1994»
14 years 5 days ago
On Index Selection Schemes for Nested Object Hierarchies
In this paper we address the problem of devising a set of indexes for a nested object hierarchy in an object-oriented database to improve the overall system performance. It is not...
Sudarshan S. Chawathe, Ming-Syan Chen, Philip S. Y...
CCS
2010
ACM
14 years 4 days ago
Data protection in outsourcing scenarios: issues and directions
Data outsourcing is an emerging paradigm that allows users and companies to give their (potentially sensitive) data to external servers that then become responsible for their stor...
Pierangela Samarati, Sabrina De Capitani di Vimerc...