Sciweavers

984 search results - page 78 / 197
» ideas 2010
Sort
View
ENTCS
2007
102views more  ENTCS 2007»
15 years 4 months ago
Selective Data Encryption in Outsourced Dynamic Environments
The amount of information held by organizations’ databases is increasing very quickly. A recently proposed solution to the problem of data management, which is becoming increasi...
Ernesto Damiani, Sabrina De Capitani di Vimercati,...
ENTCS
2007
121views more  ENTCS 2007»
15 years 4 months ago
Dagger Compact Closed Categories and Completely Positive Maps: (Extended Abstract)
ly positive maps (extended abstract) Peter Selinger 1 Department of Mathematics and Statistics Dalhousie University, Halifax, Nova Scotia, Canada Dagger compact closed categories ...
Peter Selinger
ENTCS
2007
96views more  ENTCS 2007»
15 years 4 months ago
Deduction, Strategies, and Rewriting
Automated deduction methods should be specified not procedurally, but declaratively, as inference systems which are proved correct regardless of implementation details. Then, di...
Steven Eker, Narciso Martí-Oliet, Jos&eacut...
149
Voted
ENTCS
2007
128views more  ENTCS 2007»
15 years 4 months ago
Optimisation Validation
We introduce the idea of optimisation validation, which is to formally establish that an instance of an optimising transformation indeed improves with respect to some resource mea...
David Aspinall, Lennart Beringer, Alberto Momiglia...
ENTCS
2007
89views more  ENTCS 2007»
15 years 4 months ago
Weak Probabilistic Anonymity
Abstract. Anonymity means that the identity of the user performing a certain action is maintained secret. The protocols for ensuring anonymity often use random mechanisms which can...
Yuxin Deng, Catuscia Palamidessi, Jun Pang