Sciweavers

5344 search results - page 29 / 1069
» Privacy-Preserving Set Operations
Sort
View
IACR
2011
111views more  IACR 2011»
12 years 9 months ago
Secure Multi-Party Sorting and Applications
Sorting is among the most fundamental and well-studied problems within computer science and a core step of many algorithms. In this article, we consider the problem of constructing...
Kristján Valur Jónsson, Gunnar Kreit...
ICDE
2007
IEEE
162views Database» more  ICDE 2007»
14 years 11 months ago
On Density Based Transforms for Uncertain Data Mining
In spite of the great progress in the data mining field in recent years, the problem of missing and uncertain data has remained a great challenge for data mining algorithms. Many ...
Charu C. Aggarwal
VSTTE
2012
Springer
12 years 5 months ago
Deciding Functional Lists with Sublist Sets
Motivated by the problem of deciding verification conditions for the verification of functional programs, we present new decision procedures for automated reasoning about functio...
Thomas Wies, Marco Muñiz, Viktor Kuncak
AMAI
1998
Springer
13 years 9 months ago
Nonmonotonic Reasoning with Multiple Belief Sets
ns. Finally, we study abstract properties of selection operators connected to belief set operators, which are used to choose some of the possible belief sets.
Joeri Engelfriet, Heinrich Herre, Jan Treur
ICDE
2007
IEEE
115views Database» more  ICDE 2007»
14 years 11 months ago
Preservation Of Patterns and Input-Output Privacy
Abstract breaches. To do so, the data custodian needs to transform its data. To determine the appropriate transforPrivacy preserving data mining so far has mainly mation, there are...
Shaofeng Bu, Laks V. S. Lakshmanan, Raymond T. Ng,...