Sciweavers

3395 search results - page 76 / 679
» Computational Differential Privacy
Sort
View
CAISE
2003
Springer
14 years 4 months ago
Towards a Component based Privacy Protector Architecture
The development of mobile communication technology and ubiquitous computing paradigm and the emergence of m-healthcare, m-business and m-education services have raised the urgency ...
Amr Ali Eldin, René W. Wagenaar
ISSA
2008
14 years 17 days ago
Computer Monitoring in the 21st Century Workplace
This paper attempts to lay the foundation for future research into an area that has been called the "hottest workplace privacy topic of the next decade." The existing em...
Sri Warna Mahanamahewa
SP
2002
IEEE
161views Security Privacy» more  SP 2002»
13 years 10 months ago
Improving Computer Security Using Extended Static Checking
We describe a method for finding security flaws in source code by way of static analysis. The method is notable because it allows a user to specify a wide range of security proper...
Brian Chess
MOC
2010
13 years 6 months ago
Computation of conformal representations of compact Riemann surfaces
We find a system of two polynomial equations in two unknowns, whose solution allows us to give an explicit expression of the conformal representation of a simply connected three-sh...
Guillermo López Lagomasino, Domingo Pestana...