Sciweavers

1744 search results - page 159 / 349
» What's There to Talk About
Sort
View
SIGMOD
2006
ACM
96views Database» more  SIGMOD 2006»
14 years 11 months ago
Injecting utility into anonymized datasets
Limiting disclosure in data publishing requires a careful balance between privacy and utility. Information about individuals must not be revealed, but a dataset should still be us...
Daniel Kifer, Johannes Gehrke
ICSE
2003
IEEE-ACM
14 years 11 months ago
A Compositional Formalization of Connector Wrappers
Increasingly systems are composed of parts: software components, and the interaction mechanisms (connectors) that enable them to communicate. When assembling systems from independ...
Bridget Spitznagel, David Garlan
ICSE
2005
IEEE-ACM
14 years 11 months ago
Beyond computer science
Computer science is necessary but not sufficient to understand and overcome the problems we face in software engineering. We need to understand not only the properties of the soft...
James D. Herbsleb
ESORICS
2002
Springer
14 years 10 months ago
Confidentiality Policies and Their Enforcement for Controlled Query Evaluation
Abstract. An important goal of security in information systems is confidentiality. A confidentiality policy specifies which users should be forbidden to acquire what kind of inform...
Joachim Biskup, Piero A. Bonatti
DCC
2005
IEEE
14 years 10 months ago
Two-Level Directory based Compression
In this paper we present a new dictionary-based preprocessing technique and its implementation called TWRT (Two-level Word Replacing Transformation). Our preprocessor uses several...
Przemyslaw Skibinski