Sciweavers

3984 search results - page 118 / 797
» A Model-Driven Transformation Method
Sort
View
ICIP
2005
IEEE
16 years 5 months ago
Redundant-wavelet watermarking with pixel-wise masking
An algorithm is presented which implements image watermarking in the domain of an overcomplete, or redundant, wavelet transform. This algorithm expands on a previous method which ...
Kristen M. Parker, James E. Fowler
106
Voted
EDBT
2006
ACM
106views Database» more  EDBT 2006»
16 years 3 months ago
Online, Non-blocking Relational Schema Changes
A database schema should be able to evolve to reflect changes to the universe it represents. In existing systems, user transactions get blocked during complex schema transformation...
Jørgen Løland, Svein-Olaf Hvasshovd
145
Voted
SDMW
2004
Springer
15 years 9 months ago
Achieving Privacy Preservation when Sharing Data for Clustering
Abstract. In this paper, we address the problem of protecting the underlying attribute values when sharing data for clustering. The challenge is how to meet privacy requirements an...
Stanley R. M. Oliveira, Osmar R. Zaïane
146
Voted
IFM
2010
Springer
147views Formal Methods» more  IFM 2010»
15 years 1 months ago
Symbolic Model-Checking of Optimistic Replication Algorithms
Abstract. The Operational Transformation (OT) approach, used in many collaborative editors, allows a group of users to concurrently update replicas of a shared object and exchange ...
Hanifa Boucheneb, Abdessamad Imine, Manal Najem
137
Voted
IEEEPACT
2007
IEEE
15 years 10 months ago
Automatic Correction of Loop Transformations
Loop nest optimization is a combinatorial problem. Due to the growing complexity of modern architectures, it involves two increasingly difficult tasks: (1) analyzing the profita...
Nicolas Vasilache, Albert Cohen, Louis-Noël P...