#### Filter Results:

#### Publication Year

2000

2014

#### Publication Type

#### Co-author

#### Publication Venue

#### Key Phrases

Learn More

- Marcelo Côrtes Neri, Emily Gustafsson-Wright, Guilherme Sedlacek, Daniela Ribeiro da Costa, Alexandre Pinto
- 2000

This paper evaluates the long-run effects of economic instability. In particular, we study the impact of idiosyncratic shocks to father's income on children's human capital accumulation variables such as school drop-outs, repetition rates and domestic and non-domestic labor. Although, the problem of child labor in Brazil has declined greatly during the last… (More)

The Use-Case Controller pattern deals with the problem of mapping use case specifications to a cost-effective implementation easily maintainable. The pattern suggests delegating the responsibility for managing a use-case's flow of execution to a specialized controller object, thus localizing this functionality and its possible changes. Use-case controllers… (More)

Kolmogorov Complexity measures the amount of information in a string by the size of the smallest program that generates that string. Antunes, Fortnow, van Melkebeek, and Vinodchandran captured the notion of useful information by computational depth, the difference between the polynomial-time-bounded Kolmogorov complexity and traditional Kolmogorov… (More)

In the information theoretic world, entropy is both the measure of randomness in a source and a bound for the compression achievable for that source by any encoding scheme. But when we must restrict ourselves to efficient schemes, entropy no longer captures these notions well. For example, there are distributions with very low entropy that nonetheless look… (More)

This paper addresses the scenario of multi-release anonymization of datasets. We consider dynamic datasets where data can be inserted and deleted, and view this scenario as a case where each release is a small subset of the dataset corresponding, for example, to the results of a query. Compared to multiple releases of the full database, this has the obvious… (More)

Attribute-based encryption (ABE) has attracted considerable attention in the research community in recent years. It has a number of applications such as broadcast encryption and the cryptographic enforcement of access control policies. Existing instantiations of ABE make use of access structures encoded either as trees of Shamir threshold secret-sharing… (More)

In [3] the authors give the first mathematical formalization of an unconditionally secure commitment scheme. Their construction has some similarities to one used to build authentication codes, so they raise the question whether there is some relation between commitment schemes and authentication schemes. They conjecture that authentication schemes with… (More)

We do a survey of some of the most important principles of anonymization present in the literature. We identify different kinds of attacks that can be thrown against an anonymized dataset and give formulas for the maximum probability of success for each. For each principle, we identify whether it is monotonous, what attacks it is suited to counter, if any,… (More)

A variant of public key encryption that promises efficiency gains due to batch processing is multi-recipient public key encryption (MR-PKE). Precisely, in MR-PKE, a dedicated encryption routine takes a vector of messages and a vector of public keys and outputs a vector of ciphertexts, where the latter can be decrypted individually, as in regular PKE. In… (More)