Sciweavers

3451 search results - page 505 / 691
» Collaborative attack modeling
Sort
View
PAKDD
2010
ACM
182views Data Mining» more  PAKDD 2010»
14 years 1 months ago
Computation of Ratios of Secure Summations in Multi-party Privacy-Preserving Latent Dirichlet Allocation
In this paper, we focus our attention on the problem of computing the ratio of two numbers, both of which are the summations of the private numbers distributed in different parties...
Bin Yang, Hiroshi Nakagawa
APSEC
2004
IEEE
14 years 1 months ago
A Systematic Method to Identify Software Components
In component-based development (CBD), component is the basic unit for reuse and it provides a relatively coarse-grained functionality. A component typically consists of several re...
Soo Dong Kim, Soo Ho Chang
CCGRID
2004
IEEE
14 years 1 months ago
A multi-path routing service for immersive environments
The Metaverse project aims to develop technology for low-cost, high-resolution networked immersive display environments that can be used for distributed collaboration, exploration...
Sherlia Shi, Lili Wang, Kenneth L. Calvert, Jim Gr...
DEXAW
2004
IEEE
80views Database» more  DEXAW 2004»
14 years 1 months ago
Traceable Document Flows
Ad-hoc data exchange, e.g., by sending email attachments, leads to multiple copies or versions of a document at dispersed nodes in a network. However, their relationships such as ...
Martin Bernauer, Gerti Kappel, Elke Michlmayr
CAISE
1995
Springer
14 years 1 months ago
Hypertext Version Management in an Actor-based Framework
In this work we discuss a number of issues for the design of hypertext systems in an actor-based model of computation. We examine how the "traditional" basic concepts whi...
Antonina Dattolo, Vincenzo Loia