Sciweavers

2740 search results - page 438 / 548
» A Model-Based Approach To Requirements Analysis
Sort
View
ACSC
2009
IEEE
15 years 4 months ago
Privacy-aware Access Control with Generalization Boundaries
Privacy is today an important concern for both data providers and data users. Data generalization can provide significant protection of an individual’s privacy, which means the...
Min Li, Hua Wang, Ashley W. Plank
ICDE
2009
IEEE
155views Database» more  ICDE 2009»
15 years 4 months ago
Join Optimization of Information Extraction Output: Quality Matters!
— Information extraction (IE) systems are trained to extract specific relations from text databases. Real-world applications often require that the output of multiple IE systems...
Alpa Jain, Panagiotis G. Ipeirotis, AnHai Doan, Lu...
AOSD
2009
ACM
15 years 4 months ago
Expressive scoping of distributed aspects
Dynamic deployment of aspects brings greater flexibility and reuse potential, but requires proper means for scoping aspects. Scoping issues are particularly crucial in a distribu...
Éric Tanter, Johan Fabry, Rémi Douen...
CHI
2009
ACM
15 years 4 months ago
Pathfinder: an online collaboration environment for citizen scientists
For over a century, citizen scientists have volunteered to collect huge quantities of data for professional scientists to analyze. We designed Pathfinder, an online environment th...
Kurt Luther, Scott Counts, Kristin B. Stecher, Aar...
SC
2009
ACM
15 years 4 months ago
Scalable work stealing
Irregular and dynamic parallel applications pose significant challenges to achieving scalable performance on large-scale multicore clusters. These applications often require ongo...
James Dinan, D. Brian Larkins, P. Sadayappan, Srir...