Sciweavers

1252 search results - page 39 / 251
» Foundations of Similarity and Utility
Sort
View
PSD
2004
Springer
108views Database» more  PSD 2004»
14 years 1 months ago
Developing Adoptable Disclosure Protection Techniques: Lessons Learned from a U.S. Experience
The development of new disclosure protection techniques is useful only insofar as those techniques are adopted by statistical agencies. In order for technical experts in disclosure...
Nicholas H. Greenia
SIGMOD
2010
ACM
207views Database» more  SIGMOD 2010»
14 years 14 days ago
Automatic contention detection and amelioration for data-intensive operations
To take full advantage of the parallelism offered by a multicore machine, one must write parallel code. Writing parallel code is difficult. Even when one writes correct code, the...
John Cieslewicz, Kenneth A. Ross, Kyoho Satsumi, Y...
CRYPTO
2000
Springer
151views Cryptology» more  CRYPTO 2000»
14 years 1 hour ago
New Public-Key Cryptosystem Using Braid Groups
Abstract. The braid groups are infinite non-commutative groups naturally arising from geometric braids. The aim of this article is twofold. One is to show that the braid groups ca...
Ki Hyoung Ko, Sangjin Lee, Jung Hee Cheon, Jae Woo...
CCS
2006
ACM
13 years 11 months ago
RoleMiner: mining roles using subset enumeration
Role engineering, the task of defining roles and associating permissions to them, is essential to realize the full benefits of the role-based access control paradigm. Essentially,...
Jaideep Vaidya, Vijayalakshmi Atluri, Janice Warne...
ACTA
2000
82views more  ACTA 2000»
13 years 7 months ago
Semantics analysis through elementary meanings
Thesaurus is a collection of words classified according to some relatedness measures among them. In this paper, we lay the theoretical foundations of thesaurus construction through...
Youichi Kobuchi, Takashi Saito, Hidenobu Nunome