394
Voted
ICDE
17 years 3 months ago
2007 IEEE
The k-anonymity privacy requirement for publishing microdata requires that each equivalence class (i.e., a set of records that are indistinguishable from each other with respect to...
158
Voted
SIGSOFT
16 years 4 months ago
2007 ACM
We present an approach for checking code against rich specifications, based on existing work that consists of encoding the program in a relational logic and using a constraint sol...
196
Voted
WWW
16 years 4 months ago
2007 ACM
Semantic similarity measures play important roles in information retrieval and Natural Language Processing. Previous work in semantic web-related applications such as community mi...
147
click to vote
CASCON
15 years 4 months ago
2007
We present preliminary work on an IDE for formal software development using tabular expressions as the basis for precise specifications and descriptions of software behaviour. 1 ...
141
click to vote
IDA
15 years 9 months ago
2007 Springer
The Denclue algorithm employs a cluster model based on kernel density estimation. A cluster is defined by a local maximum of the estimated density function. Data points are assign...
|