Sciweavers

970 search results - page 154 / 194
» case 2011
Sort
View
CBSE
2011
Springer
12 years 9 months ago
Automating information flow control in component-based distributed systems
Automating the construction of secure distributed systems becomes necessary. Indeed, developing security code requires a deep expertise and verifying that the developed code respe...
Takoua Abdellatif, Lilia Sfaxi, Riadh Robbana, Yas...
CIARP
2011
Springer
12 years 9 months ago
A Minority Class Feature Selection Method
Abstract. In many classification problems, and in particular in medical domains, it is common to have an unbalanced class distribution. This pose problems to classifiers as they ...
German Cuaya, Angélica Muñoz-Mel&eac...
CIKM
2011
Springer
12 years 9 months ago
How to carry over historic books into social networks
This paper describes how to make use of e-books that look like printed books in a knowledge network. After an overview of digitalization efforts and current digital library initia...
Heimo Müller, Hermann A. Maurer
CIKM
2011
Springer
12 years 9 months ago
Estimating selectivity for joined RDF triple patterns
A fundamental problem related to RDF query processing is selectivity estimation, which is crucial to query optimization for determining a join order of RDF triple patterns. In thi...
Hai Huang 0003, Chengfei Liu
COMPSAC
2011
IEEE
12 years 8 months ago
L1 - An Intermediate Language for Mixed-Protocol Secure Computation
—Secure Computation (SC) enables secure distributed computation of arbitrary functions of private inputs. It has many useful applications, e.g. benchmarking or auctions. Several ...
Axel Schröpfer, Florian Kerschbaum, Guenter M...