371
click to vote
ICDE
17 years 1 months ago
2007 IEEE
The k-anonymity privacy requirement for publishing microdata requires that each equivalence class (i.e., a set of records that are indistinguishable from each other with respect to...
140
click to vote
SIGSOFT
16 years 2 months ago
2007 ACM
We present an approach for checking code against rich specifications, based on existing work that consists of encoding the program in a relational logic and using a constraint sol...
170
click to vote
WWW
16 years 2 months ago
2007 ACM
Semantic similarity measures play important roles in information retrieval and Natural Language Processing. Previous work in semantic web-related applications such as community mi...
125
click to vote
CASCON
15 years 2 months ago
2007
We present preliminary work on an IDE for formal software development using tabular expressions as the basis for precise specifications and descriptions of software behaviour. 1 ...
120
click to vote
IDA
15 years 7 months ago
2007 Springer
The Denclue algorithm employs a cluster model based on kernel density estimation. A cluster is defined by a local maximum of the estimated density function. Data points are assign...
|