Sciweavers

3233 search results - page 499 / 647
» Probabilistic Data Exchange
Sort
View
ICISC
1998
132views Cryptology» more  ICISC 1998»
13 years 9 months ago
The flood-gate principle - a hybrid approach to a high security solution
The classical role of a firewall consists in protecting a computer network against attacks from the outside world, especially the Internet. Firewalls are often expensive, hard to c...
Ernst Georg Haffner, Thomas Engel, Christoph Meine...
ICMCS
2010
IEEE
146views Multimedia» more  ICMCS 2010»
13 years 9 months ago
Privacy-preserving approximation of L1 distance for multimedia applications
Alice and Bob possess sequences x and y respectively and would like to compute the 1 distance, namely x - y 1 under privacy and communication constraints. The privacy constraint r...
Shantanu Rane, Wei Sun, Anthony Vetro
EICS
2010
ACM
13 years 8 months ago
Seamless integration of heterogeneous UI components
Component-based software engineering is a paradigm aiming at better ways to reuse existing code and to distribute work across teams. Integrating UI components developed with diffe...
Heiko Paulheim, Atila Erdogan
CORR
2010
Springer
118views Education» more  CORR 2010»
13 years 8 months ago
The Citation Field of Evolutionary Economics
: Evolutionary economics has developed into an academic field of its own, institutionalized around, amongst others, the Journal of Evolutionary Economics (JEE). This paper analyzes...
Wilfred Dolfsma, Loet Leydesdorff
CORR
2008
Springer
110views Education» more  CORR 2008»
13 years 8 months ago
Audit and Change Analysis of Spreadsheets
Because spreadsheets have a large and growing importance in real-world work, their contents need to be controlled and validated. Generally spreadsheets have been difficult to veri...
John C. Nash, Neil Smith, Andy Adler