Sciweavers

976 search results - page 48 / 196
» Evaluating Adversarial Partitions
Sort
View
LOGCOM
2010
154views more  LOGCOM 2010»
13 years 4 months ago
Collaborative Runtime Verification with Tracematches
Perfect pre-deployment test coverage is notoriously difficult to achieve for large applications. Given enough end users, however, many more test cases will be encountered during a...
Eric Bodden, Laurie J. Hendren, Patrick Lam, Ondre...
STACS
2010
Springer
14 years 4 months ago
Efficient and Error-Correcting Data Structures for Membership and Polynomial Evaluation
We construct efficient data structures that are resilient against a constant fraction of adversarial noise. Our model requires that the decoder answers most queries correctly with...
Victor Chen, Elena Grigorescu, Ronald de Wolf
ESORICS
2011
Springer
12 years 9 months ago
To Release or Not to Release: Evaluating Information Leaks in Aggregate Human-Genome Data
The rapid progress of human genome studies leads to a strong demand of aggregate human DNA data (e.g, allele frequencies, test statistics, etc.), whose public dissemination, howeve...
Xiao-yong Zhou, Bo Peng, Yong Fuga Li, Yangyi Chen...
DRM
2007
Springer
14 years 4 months ago
Slicing obfuscations: design, correctness, and evaluation
The goal of obfuscation is to transform a program, without affecting its functionality, such that some secret information within the program can be hidden for as long as possible...
Anirban Majumdar, Stephen Drape, Clark D. Thombors...
HICSS
2008
IEEE
97views Biometrics» more  HICSS 2008»
14 years 4 months ago
Social Network Analysis as a Tool to Evaluate the Effectiveness of EC Funded Networks of Excellence: The Case of DEMO-net
The European Commission, through its Framework Programme aims to stimulate the development of sustained collaborative research networks across Europe. Social network analysis (SNA...
Kathy Buckner, Peter Cruickshank