Sciweavers

1995 search results - page 195 / 399
» What's the Problem
Sort
View
ESORICS
1994
Springer
15 years 8 months ago
Aggregation in Relational Databases: Controlled Disclosure of Sensitive Information
It has been observed that often the release of a limited part of an information resource poses no security risks, but the relase of a sufficiently large part of that resource might...
Amihai Motro, Donald G. Marks, Sushil Jajodia
159
Voted
CLEF
2004
Springer
15 years 10 months ago
How to Visually Retrieve Images from the St. Andrews Collection Using GIFT
Abstract. The ImageCLEF task of CLEF has a main goal in the retrieval of images from multi–lingual collections. The 2003 imageCLEF saw no group using the visual information of im...
Henning Müller, Antoine Geissbühler
SIGMOD
2010
ACM
155views Database» more  SIGMOD 2010»
15 years 2 months ago
Search in social networks with access control
More and more important data is accumulated inside social networks. Limiting the flow of private information across a social network is very important, and most social networks pr...
Truls Amundsen Bjørklund, Michaela Göt...
CGO
2005
IEEE
15 years 10 months ago
Model-Based Framework: An Approach for Profit-Driven Optimization
Although optimizations have been applied for a number of years to improve the performance of software, problems that have been long-standing remain, which include knowing what opt...
Min Zhao, Bruce R. Childers, Mary Lou Soffa
UC
2005
Springer
15 years 10 months ago
On Model-Checking of P Systems
Abstract. Membrane computing is a branch of molecular computing that aims to develop models and paradigms that are biologically motivated. It identifies an unconventional computin...
Zhe Dang, Oscar H. Ibarra, Cheng Li, Gaoyan Xie