Sciweavers

11921 search results - page 2089 / 2385
» Community Information Management
Sort
View
SIGCSE
2010
ACM
175views Education» more  SIGCSE 2010»
15 years 11 months ago
Compatibility of partnered students in computer science education
This paper details the results of an investigation into the compatibility of partnered computer science students. The study involved approximately 290 students at the University o...
Joshua Sennett, Mark Sherriff
CCS
2010
ACM
15 years 11 months ago
Bureaucratic protocols for secure two-party sorting, selection, and permuting
In this paper, we introduce a framework for secure two-party (S2P) computations, which we call bureaucratic computing, and we demonstrate its efficiency by designing practical S2P...
Guan Wang, Tongbo Luo, Michael T. Goodrich, Wenlia...
CCS
2010
ACM
15 years 11 months ago
Toward practical authorization-dependent user obligation systems
Many authorization system models include some notion of obligation. Little attention has been given to user obligations that depend on and affect authorizations. However, to be u...
Murillo Pontual, Omar Chowdhury, William H. Winsbo...
ACSC
2009
IEEE
15 years 11 months ago
Privacy-aware Access Control with Generalization Boundaries
Privacy is today an important concern for both data providers and data users. Data generalization can provide significant protection of an individual’s privacy, which means the...
Min Li, Hua Wang, Ashley W. Plank
DASFAA
2009
IEEE
133views Database» more  DASFAA 2009»
15 years 11 months ago
Probabilistic Ranking in Uncertain Vector Spaces
Abstract. In many application domains, e.g. sensor databases, traffic management or recognition systems, objects have to be compared based on positionally and existentially uncert...
Thomas Bernecker, Hans-Peter Kriegel, Matthias Ren...
« Prev « First page 2089 / 2385 Last » Next »