Sciweavers

969 search results - page 68 / 194
» Generalized matching from theory to application
Sort
View
CCS
2004
ACM
14 years 2 months ago
Reusable cryptographic fuzzy extractors
We show that a number of recent definitions and constructions of fuzzy extractors are not adequate for multiple uses of the same fuzzy secret—a major shortcoming in the case of...
Xavier Boyen
JODS
2007
102views Data Mining» more  JODS 2007»
13 years 9 months ago
Default Clustering with Conceptual Structures
This paper describes a theoretical framework for inducing knowledge from incomplete data sets. The general framework can be used with any formalism based on a lattice structure. It...
Julien Velcin, Jean-Gabriel Ganascia
TSE
1998
109views more  TSE 1998»
13 years 9 months ago
An Evaluation of the MOOD Set of Object-Oriented Software Metrics
—This paper describes the results of an investigation into a set of metrics for object-oriented design, called the MOOD metrics. The merits of each of the six MOOD metrics is dis...
Richard H. Carver, Steve Counsell, Reuben V. Nithi
DEBS
2011
ACM
13 years 23 days ago
Declarative data-driven coordination
Many data-driven social and Web applications involve collaboration and coordination. The vision of declarative data-driven coordination (D3C), proposed in [9], is to support coord...
Johannes Gehrke
CCS
2004
ACM
14 years 2 months ago
Comparing the expressive power of access control models
Comparing the expressive power of access control models is recognized as a fundamental problem in computer security. Such comparisons are generally based on simulations between di...
Mahesh V. Tripunitara, Ninghui Li