Sciweavers

642 search results - page 40 / 129
» Roles Versus Classes
Sort
View
ICDE
2007
IEEE
115views Database» more  ICDE 2007»
15 years 6 days ago
Preservation Of Patterns and Input-Output Privacy
Abstract breaches. To do so, the data custodian needs to transform its data. To determine the appropriate transforPrivacy preserving data mining so far has mainly mation, there are...
Shaofeng Bu, Laks V. S. Lakshmanan, Raymond T. Ng,...
WWW
2008
ACM
14 years 11 months ago
Secure or insure?: a game-theoretic analysis of information security games
Despite general awareness of the importance of keeping one's system secure, and widespread availability of consumer security technologies, actual investment in security remai...
Jens Grossklags, Nicolas Christin, John Chuang
DAGSTUHL
1997
14 years 5 days ago
Ray-Based Data Level Comparisons of Direct Volume Rendering Algorithms
This paper describes and demonstrates the e ectiveness of several metrics for data level comparison of direct volume rendering (DVR) algorithms. The focus is not on speed ups from...
Kwansik Kim, Alex Pang
ALT
2003
Springer
14 years 7 months ago
Intrinsic Complexity of Uniform Learning
Inductive inference is concerned with algorithmic learning of recursive functions. In the model of learning in the limit a learner successful for a class of recursive functions mus...
Sandra Zilles
METRICS
2003
IEEE
14 years 4 months ago
Design Patterns and Change Proneness: An Examination of Five Evolving Systems
Design patterns are recognized, named solutions to common design problems. The use of the most commonly referenced design patterns should promote adaptable and reusable program co...
James M. Bieman, Greg Straw, Huxia Wang, P. Willar...