350
click to vote
ICDE
16 years 11 months ago
2007 IEEE
The k-anonymity privacy requirement for publishing microdata requires that each equivalence class (i.e., a set of records that are indistinguishable from each other with respect to...
125
click to vote
SIGSOFT
16 years 23 days ago
2007 ACM
We present an approach for checking code against rich specifications, based on existing work that consists of encoding the program in a relational logic and using a constraint sol...
151
click to vote
WWW
16 years 21 days ago
2007 ACM
Semantic similarity measures play important roles in information retrieval and Natural Language Processing. Previous work in semantic web-related applications such as community mi...
107
click to vote
CASCON
15 years 1 months ago
2007
We present preliminary work on an IDE for formal software development using tabular expressions as the basis for precise specifications and descriptions of software behaviour. 1 ...
107
click to vote
IDA
15 years 6 months ago
2007 Springer
The Denclue algorithm employs a cluster model based on kernel density estimation. A cluster is defined by a local maximum of the estimated density function. Data points are assign...
|