Sciweavers

4335 search results - page 5 / 867
» Privatizing Constraint Optimization
Sort
View
FC
2005
Springer
120views Cryptology» more  FC 2005»
14 years 1 months ago
Achieving Fairness in Private Contract Negotiation
Abstract. Suppose Alice and Bob are two entities (e.g. agents, organizations, etc.) that wish to negotiate a contract. A contract consists of several clauses, and each party has ce...
Keith B. Frikken, Mikhail J. Atallah
ECOOP
2009
Springer
14 years 8 months ago
From Public to Private to Absent: Refactoring Java Programs under Constrained Accessibility
Contemporary refactoring tools for JAVA aiding in the restructuring of programs have problems with respecting access modifiers such as public and private: while some tools provide ...
Friedrich Steimann, Andreas Thies
PVLDB
2010
104views more  PVLDB 2010»
13 years 6 months ago
Boosting the Accuracy of Differentially Private Histograms Through Consistency
We show that it is possible to significantly improve the accuracy of a general class of histogram queries while satisfying differential privacy. Our approach carefully chooses a...
Michael Hay, Vibhor Rastogi, Gerome Miklau, Dan Su...
AE
2003
Springer
14 years 23 days ago
An Agent Model for First Price and Second Price Private Value Auctions
The aim of this research is to develop an adaptive agent based model of auction scenarios commonly used in auction theory to help understand how competitors in auctions reach equil...
Anthony J. Bagnall, Iain Toft
MMSEC
2004
ACM
95views Multimedia» more  MMSEC 2004»
14 years 29 days ago
An improved attack analysis on a public-key spread spectrum watermarking
We analyze the fingerprinting method in [1] and suggest attacks that are better than the ones presented therein. To do this, we observe and use some extra information available i...
Mustafa Kesal, Mehmet Kivanç Mihçak,...