Sciweavers

501 search results - page 19 / 101
» Redundancy and Diversity in Security
Sort
View
ICDE
2007
IEEE
1577views Database» more  ICDE 2007»
15 years 7 months ago
t-Closeness: Privacy Beyond k-Anonymity and l-Diversity
The k-anonymity privacy requirement for publishing microdata requires that each equivalence class (i.e., a set of records that are indistinguishable from each other with respect to...
Ninghui Li, Tiancheng Li, Suresh Venkatasubramania...
ACSAC
1999
IEEE
14 years 12 days ago
Security Policy Coordination for Heterogeneous Information Systems
Coordinating security policies in information enclaves is challenging due to their heterogeneity and autonomy. Administrators must reconcile the semantic diversity of data and sec...
John Hale, Pablo Galiasso, Mauricio Papa, Sujeet S...
SIGCSE
2008
ACM
111views Education» more  SIGCSE 2008»
13 years 8 months ago
Improving computer science diversity through summer camps
Summer camps offer a ripe opportunity for increasing computer science diversity. This panel provides several examples of summer camps that specifically recruit from traditionally ...
Dennis P. Groth, Helen H. Hu, Betty Lauer, Hwajung...
BMCBI
2004
120views more  BMCBI 2004»
13 years 8 months ago
Optimal cDNA microarray design using expressed sequence tags for organisms with limited genomic information
Background: Expression microarrays are increasingly used to characterize environmental responses and hostparasite interactions for many different organisms. Probe selection for cD...
Yian A. Chen, David J. Mckillen, Shuyuan Wu, Matth...
MASCOTS
2008
13 years 9 months ago
Optimizing Galois Field Arithmetic for Diverse Processor Architectures and Applications
Galois field implementations are central to the design of many reliable and secure systems, with many systems implementing them in software. The two most common Galois field opera...
Kevin M. Greenan, Ethan L. Miller, Thomas J. E. Sc...