Sciweavers

31 search results - page 2 / 7
» Ensuring Containment Constraints in Graph-based Model Transf...
Sort
View
KDD
2002
ACM
157views Data Mining» more  KDD 2002»
14 years 6 months ago
Transforming data to satisfy privacy constraints
Data on individuals and entities are being collected widely. These data can contain information that explicitly identifies the individual (e.g., social security number). Data can ...
Vijay S. Iyengar
ER
2000
Springer
116views Database» more  ER 2000»
13 years 9 months ago
On Business Process Model Transformations
A business process model represents the basic building block for a workflow-enabled enterprise information system. Generally, a process model evolves through numerous changes durin...
Wasim Sadiq, Maria E. Orlowska
ICMT
2010
Springer
13 years 10 months ago
Synthesis of OCL Pre-conditions for Graph Transformation Rules
Graph transformation (GT) is being increasingly used in Model Driven Engineering (MDE) to describe in-place transformations like animations and refactorings. For its practical use,...
Jordi Cabot, Robert Clarisó, Esther Guerra,...
ACSD
2005
IEEE
126views Hardware» more  ACSD 2005»
13 years 11 months ago
Modelling and Analysis of Distributed Simulation Protocols with Distributed Graph Transformation
This paper presents our approach to model distributed discrete event simulation systems in the framework of distributed graph transformation. We use distributed typed attributed g...
Juan de Lara, Gabriele Taentzer
GECCO
2009
Springer
131views Optimization» more  GECCO 2009»
13 years 3 months ago
A multi-objective approach to data sharing with privacy constraints and preference based objectives
Public data sharing is utilized in a number of businesses to facilitate the exchange of information. Privacy constraints are usually enforced to prevent unwanted inference of info...
Rinku Dewri, Darrell Whitley, Indrajit Ray, Indrak...