Sciweavers

89 search results - page 3 / 18
» Information Theoretic Bounds on Authentication Systems in Qu...
Sort
View
ECIR
2009
Springer
13 years 5 months ago
Graded-Inclusion-Based Information Retrieval Systems
This paper investigates the use of fuzzy logic mechanisms coming from the database community, namely graded inclusions, to model the information retrieval process. In this framewor...
Patrick Bosc, Vincent Claveau, Olivier Pivert, Lau...
ACSAC
2010
IEEE
13 years 5 months ago
Quantifying information leaks in software
Leakage of confidential information represents a serious security risk. Despite a number of novel, theoretical advances, it has been unclear if and how quantitative approaches to ...
Jonathan Heusser, Pasquale Malacaria
CSE
2009
IEEE
14 years 2 months ago
Noise Injection for Search Privacy Protection
Abstract—Extensive work has been devoted to private information retrieval and privacy preserving data mining. To protect user privacy from search engines, however, most current a...
Shaozhi Ye, Shyhtsun Felix Wu, Raju Pandey, Hao Ch...
ICASSP
2011
IEEE
12 years 11 months ago
Belief theoretic methods for soft and hard data fusion
In many contexts, one is confronted with the problem of extracting information from large amounts of different types soft data (e.g., text) and hard data (from e.g., physics-based...
Thanuka Wickramarathne, Kamal Premaratne, Manohar ...
SSD
2009
Springer
141views Database» more  SSD 2009»
14 years 2 months ago
Spatial Cloaking Revisited: Distinguishing Information Leakage from Anonymity
Abstract. Location-based services (LBS) are receiving increasing popularity as they provide convenience to mobile users with on-demand information. The use of these services, howev...
Kar Way Tan, Yimin Lin, Kyriakos Mouratidis