Ergebnisse 71 - 80 von 120 :

  • Informationstechnik x
Alle zurücksetzen
Approximation of Isomorphic Infinite Two-Person Non-Cooperative Games by Variously Sampling the Players’ Payoff Functions and Reshaping Payoff Matrices into Bimatrix Game

. 8, iss. 1, pp. 178–194, Jan. 2005. [13] R. Zhao, G. Neighbour, J. Han, M. McGuire, and P. Deutz, “Using game theory to describe strategy selection for environmental risk and carbon emissions reduction in the green supply chain,” Journal of Loss Prevention in the Process Industries , vol. 25, iss. 6, pp. 927–936, Nov. 2012. [14] J. Scheffran, “The dynamic interaction between economy and ecology: Cooperation, stability and sustainability for a dynamic-game model of

Open access
Cardinality Estimators do not Preserve Privacy

extension extension adding HyperLogLog data structures as a native data type. . Accessed: 2018-05-03. [5] Vikas G Ashok and Ravi Mukkamala. 2014. A scalable and efficient privacy preserving global itemset support approximation using Bloom filters. In IFIP Annual Conference on Data and Applications Security and Privacy . Springer, 382–389. [6] Ziv Bar-Yossef, TS Jayram, Ravi Kumar, D Sivakumar, and Luca Trevisan. 2002. Counting distinct elements in a data stream. In International Workshop on Randomization and

Open access
PrivateRide: A Privacy-Enhanced Ride-Hailing Service

: May 2016. [7] . Last visited: May 2016. [8] . Last visited: May 2016. [9] Cryptographic key length recommendation. . Last visited: May 2016. [10] G. Arfaoui, J.-F. Lalande, J. Traoré, N. Desmoulins, P. Berthomé, and S. Gharout. A Practical Set-Membership Proof for Privacy-Preserving NFC Mobile Ticketing. Proc. of the 15th Privacy Enhancing Technologies

Open access
Sentiment Analysis in Latvian and Russian: A Survey

,” Complex Systems Informatics and Modeling Quarterly, no. 7, pp. 51–59, 2016. [21] “Latvian positive and negative sentiment words.” [Online]. Available: . [Accessed: Mar. 10, 2018]. [22] G. Špats, “Resources for opinion mining for written content classification in Latvian text.” [Online]. Available: . [Accessed: Mar. 10, 2018]. [23] N. Loukachevitch and Y. Rubtsova, “Entity-Oriented Sentiment Analysis of Tweets: Results

Open access
Your Choice MATor(s)
Large-scale Quantitative Anonymity Assessment of Tor Path Selection Algorithms Against Structural Attacks

), CCS ’14, pages 513-524. ACM, ACM, 2014. [11] M. Backes and B. Köpf. Quantifying information flow in cryptographic systems. Mathematical Structures in Computer Science, 25(2):457-479, 2015. [12] M. Backes, S. Meiser, and M. Slowik. Your choice mator(s): Large-scale quantitative anonymity assessment of tor path selection algorithms against structural attacks. Technical Report A/03/2015, Saarland University, December 2015. [13] C. Diaz, S. Seys, J. Claessens, and B. Preneel. Towards measuring anonymity. In Privacy

Open access
(Do Not) Track Me Sometimes: Users’ Contextual Preferences for Web Tracking

. Privacy, trust, and self-disclosure online. Human- Computer Interaction, 25(1):1-24, 2010. [25] A. Lambrecht and C. Tucker. When does retargeting work? Information specificity in online advertising. Journal of Marketing Research, 2013. [26] P. Leon, B. Ur, R. Shay, Y. Wang, R. Balebako, and L. Cranor. Why Johnny can’t opt out: A usability evaluation of tools to limit online behavioral advertising. In Proc. CHI, 2012. [27] P. G. Leon, B. Ur, Y. Wang, M. Sleeper, R. Balebako, R. Shay, L. Bauer, M. Christodorescu, and L. F

Open access
Privacy-Preserving Interdomain Routing at Internet Scale

. In USENIX Security’11 , pages 539–554. USENIX, 2011. [25] S. G. Choi, K.-W. Hwang, J. Katz, T. Malkin, and D. Rubenstein. Secure multi-party computation of Boolean circuits with applications to privacy in on-line marketplaces. In CT-RSA’12 , volume 7178 of LNCS , pages 416–432. Springer, 2012. [26] P. Bogetoft, D. L. Christensen, I. Damgård, M. Geisler, T. Jakobsen, M. Krøigaard, J. D. Nielsen, J. B. Nielsen, K. Nielsen, J. Pagter, M. Schwartzbach, and T. Toft. Secure multiparty computation goes live. In FC’09 , volume 5628 of LNCS , pages 325

Open access
An Overview of the Use of GML in Modern Spatial Data Infrastructures

Modelling & Sources, vol. 25, no. 2, pp. 82-198, Feb. 2010. Available: Sciencedirect, [Accessed: Sept. 23, 2010]. C. Kiehle , "Business Logic for Geoprocessing of Distributed Geodata", Computers & Geosciences, Vol. 32, Issue 10, Elsevier Ltd, pp. 1746-1757, 2006. Available: Sciencedirect, [Accessed: Sept. 23, 2010]. S. Steiniger, A. J. S. Hunter , Free and Open Source GIS Software for Building a Spatial

Open access
The Model Transformation for Getting a UML Class Diagram from a Topological Functioning Model

R eferences [1] Miller, J. and Mukerji, J., “MDA Guide Version 1.0.1”, OMG. [Online]. Available: . [Accessed: 14 March 2015]. [2] Osis, J., Asnina, E. and Grave, A., “Formal Computation Independent Model of the Problem Domain within the MDA,” in Information Systems and Formal Models, Proc. of the 10 th Int. Conf., ISIM’07 , Silesian University in Opava, Czech Republic, 2007, pp. 47–54. [3] Osis, J., Asnina, E. and Grave, A., “Computation Independent Modeling within the MDA,” in Proc. of the IEEE

Open access
A Semantic Retrieval System for Case Law

system,” Communications of the ACM , vol. 32, no. 8, pp. 928–938, 1989. [11] P. Jackson, K. Al-Kofahi, A. Tyrrell, and A Vachher, “Information Extraction from Case Law and Retrieval of Prior Cases,” Artificial Intelligence Journal, vol. 150, no. 1–2, pp. 239–290, 2003. [12] E. M. Uijttenbroek, A. R. Lodder, M. C. A. Klein, W. G. Rildeboer, W. V. Steenbergen, R. L. L. Sie, P. E. M. Huygen, and F. van Harmelen, “Retrieval of Case Law to Provide Layman with Information about

Open access