Sciweavers

24 search results - page 4 / 5
» Strictness Analysis for Attribute Grammars
Sort
View
SIGKDD
2008
107views more  SIGKDD 2008»
13 years 4 months ago
A privacy-aware trajectory tracking query engine
Advances in telecommunications and GPS sensors technology have made possible the collection of data like time series of locations, related to the movement of individuals. The anal...
Aris Gkoulalas-Divanis, Vassilios S. Verykios
ENTCS
2008
105views more  ENTCS 2008»
13 years 4 months ago
Development of a Modelica Compiler Using JastAdd
This paper describes experiences from implementing key parts of a compiler for Modelica, an object-oriented language supporting declarative modeling and simulation of complex phys...
Johan Åkesson, Torbjörn Ekman, Gör...
ICDE
2008
IEEE
124views Database» more  ICDE 2008»
14 years 6 months ago
Mining Approximate Order Preserving Clusters in the Presence of Noise
Subspace clustering has attracted great attention due to its capability of finding salient patterns in high dimensional data. Order preserving subspace clusters have been proven to...
Mengsheng Zhang, Wei Wang 0010, Jinze Liu
HICSS
2007
IEEE
135views Biometrics» more  HICSS 2007»
13 years 11 months ago
Composable Language Extensions for Computational Geometry: A Case Study
— This paper demonstrates how two different sets of powerful domain specific language features can be specified and deployed as composable language extensions. These extensions...
Eric Van Wyk, Eric Johnson
ICCS
2009
Springer
13 years 11 months ago
Access Policy Design Supported by FCA Methods
Role Based Access Control (RBAC) is a methodology for providing users in an IT system specific permissions like write or read to t abstracts from specific users and binds permiss...
Frithjof Dau, Martin Knechtel