Sciweavers

2742 search results - page 321 / 549
» Deriving Category Theory from Type Theory
Sort
View
KDD
2004
ACM
159views Data Mining» more  KDD 2004»
14 years 2 months ago
Optimal randomization for privacy preserving data mining
Randomization is an economical and efficient approach for privacy preserving data mining (PPDM). In order to guarantee the performance of data mining and the protection of individ...
Michael Yu Zhu, Lei Liu
DIALM
2003
ACM
99views Algorithms» more  DIALM 2003»
14 years 2 months ago
Spatio-temporal data reduction with deterministic error bounds
A common way of storing spatio-temporal information about mobile devices is in the form of a 3D (2D geography + time) trajectory. We argue that when cellular phones and Personal D...
Hu Cao, Ouri Wolfson, Goce Trajcevski
ISLPED
2003
ACM
71views Hardware» more  ISLPED 2003»
14 years 2 months ago
Strained-si devices and circuits for low-power applications
Static and dynamic power for strained-Si device is analyzed and compared with conventional bulk-Si technology. Optimum device design points are suggested with controlling physical...
Keunwoo Kim, Rajiv V. Joshi, Ching-Te Chuang
SACMAT
2003
ACM
14 years 2 months ago
Dependencies and separation of duty constraints in GTRBAC
A Generalized Temporal Role Based Access Control (GTRBAC) model that captures an exhaustive set of temporal constraint needs for access control has recently been proposed. GTRBAC...
James Joshi, Basit Shafiq, Arif Ghafoor, Elisa Ber...
ATAL
2003
Springer
14 years 2 months ago
Towards interest-based negotiation
Negotiation is essential in settings where agents have conflicting interests and a desire to cooperate. In many approaches, agents are assumed to have pre-set, fixed preferences...
Iyad Rahwan, Liz Sonenberg, Frank Dignum