Sciweavers

1662 search results - page 61 / 333
» Privately Finding Specifications
Sort
View
AIEDAM
2004
77views more  AIEDAM 2004»
15 years 2 months ago
The role of trust in distributed design
Automated support of design teams, consisting of both human and automated systems, requires an understanding of the role of trust in distributed design processes. By explicitating ...
Niek J. E. Wijngaards, Hidde M. Boonstra, Frances ...
ICDM
2010
IEEE
160views Data Mining» more  ICDM 2010»
15 years 16 days ago
A Privacy Preserving Framework for Gaussian Mixture Models
Abstract--This paper presents a framework for privacypreserving Gaussian Mixture Model computations. Specifically, we consider a scenario where a central service wants to learn the...
Madhusudana Shashanka
PROVSEC
2010
Springer
15 years 13 days ago
Identity Based Public Verifiable Signcryption Scheme
Abstract. Signcryption as a single cryptographic primitive offers both confidentiality and authentication simultaneously. Generally in signcryption schemes, the message is hidden a...
S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Ra...
184
Voted
ICPP
2009
IEEE
15 years 8 days ago
Using Coherence Information and Decay Techniques to Optimize L2 Cache Leakage in CMPs
This paper evaluates several techniques to save leakage in CMP L2 caches by selectively switching off the less used lines. We primarily focus on private snoopy L2 caches. In this c...
Matteo Monchiero, Ramon Canal, Antonio Gonzá...
129
Voted
IAT
2010
IEEE
14 years 12 months ago
Collaborative Learning of Ontology Fragments by Co-operating Agents
Abstract--Collaborating agents require either prior agreement on the shared vocabularies that they use for communication, or some means of translating between their private ontolog...
Heather S. Packer, Nicholas Gibbins, Nicholas R. J...