Sciweavers

733 search results - page 42 / 147
» Private inference control
Sort
View
MHCI
2004
Springer
14 years 1 months ago
EMG as a Subtle Input Interface for Mobile Computing
Abstract. Rather than merely imitating the desktop metaphor for mobile devices, new interface paradigms that take into account the particular characteristics of mobility, need to b...
Enrico Costanza, Alberto Perdomo, Samuel A. Invers...
PET
2004
Springer
14 years 1 months ago
Language-Based Enforcement of Privacy Policies
Abstract. We develop a language-based approach for modeling and verifying aspects of privacy policies. Our approach relies on information-flow control. Concretely, we use the prog...
Katia Hayati, Martín Abadi
EAGC
2003
Springer
14 years 28 days ago
Decentralized vs. Centralized Economic Coordination of Resource Allocation in Grids
Application layer networks are software architectures that allow the provisioning of services requiring a huge amount of resources by connecting large numbers of individual compute...
Torsten Eymann, Michael Reinicke, Oscar Ardaiz, Pa...
SIGMOD
2004
ACM
160views Database» more  SIGMOD 2004»
14 years 7 months ago
Extending Query Rewriting Techniques for Fine-Grained Access Control
Current day database applications, with large numbers of users, require fine-grained access control mechanisms, at the level of individual tuples, not just entire relations/views,...
Shariq Rizvi, Alberto O. Mendelzon, S. Sudarshan, ...
AAAI
1998
13 years 9 months ago
Learning Investment Functions for Controlling the Utility of Control Knowledge
The utility problem occurs when the cost of the acquired knowledge outweighs its bene ts. When the learner acquires control knowledge for speeding up a problem solver, the bene t ...
Oleg Ledeniov, Shaul Markovitch