Sciweavers

19 search results - page 3 / 4
» Determining the Origin and Structure of Person Names
Sort
View
CIKM
2004
Springer
13 years 10 months ago
Processing content-oriented XPath queries
Document-centric XML collections contain text-rich documents, marked up with XML tags that add lightweight semantics to the text. Querying such collections calls for a hybrid quer...
Börkur Sigurbjörnsson, Jaap Kamps, Maart...
CCS
2011
ACM
12 years 5 months ago
Policy auditing over incomplete logs: theory, implementation and applications
We present the design, implementation and evaluation of an algorithm that checks audit logs for compliance with privacy and security policies. The algorithm, which we name reduce,...
Deepak Garg, Limin Jia, Anupam Datta
SIGSOFT
2003
ACM
14 years 6 months ago
Regression testing of GUIs
Although graphical user interfaces (GUIs) constitute a large part of the software being developed today and are typically created using rapid prototyping, there are no effective r...
Atif M. Memon, Mary Lou Soffa
SIGMETRICS
2003
ACM
13 years 10 months ago
Queueing systems with long-range dependent input process and subexponential service times
We analyze the asymptotic tail distribution of stationary waiting times and stationary virtual waiting times in a singleserver queue with long-range dependent arrival process and ...
Cathy H. Xia, Zhen Liu
EDBT
2008
ACM
111views Database» more  EDBT 2008»
14 years 5 months ago
Micro-aggregation-based heuristics for p-sensitive k-anonymity: one step beyond
Micro-data protection is a hot topic in the field of Statistical Disclosure Control (SDC), that has gained special interest after the disclosure of 658000 queries by the AOL searc...
Agusti Solanas, Francesc Sebé, Josep Doming...