Sciweavers

2826 search results - page 385 / 566
» A resource-based analysis of IT sourcing
Sort
View
IPM
2010
133views more  IPM 2010»
15 years 10 days ago
A concept-relationship acquisition and inference approach for hierarchical taxonomy construction from tags
Taxonomy construction is a resource-demanding, top down, and time consuming effort. It does not always cater for the prevailing context of the captured information. This paper pro...
Eric Tsui, W. M. Wang, Chi Fai Cheung, Adela S. M....
157
Voted
VL
2010
IEEE
247views Visual Languages» more  VL 2010»
15 years 7 days ago
Cleanroom: Edit-Time Error Detection with the Uniqueness Heuristic
Many dynamic programming language features, such as implicit declaration, reflection, and code generation, make it difficult to verify the existence of identifiers through standar...
Andrew J. Ko, Jacob O. Wobbrock
FOCS
2010
IEEE
14 years 12 months ago
The Limits of Two-Party Differential Privacy
We study differential privacy in a distributed setting where two parties would like to perform analysis of their joint data while preserving privacy for both datasets. Our results ...
Andrew McGregor, Ilya Mironov, Toniann Pitassi, Om...
116
Voted
MASS
2010
157views Communications» more  MASS 2010»
14 years 11 months ago
Spatial extension of the Reality Mining Dataset
Data captured from a live cellular network with the real users during their common daily routine help to understand how the users move within the network. Unlike the simulations wi...
Michal Ficek, Lukas Kencl
119
Voted
PDPTA
2010
14 years 11 months ago
Collecting Sensor Data for High-Performance Computing: A Case-study
- Many research questions remain open with regard to improving reliability in exascale systems. Among others, statistics-based analysis has been used to find anomalies, to isolate ...
Line C. Pouchard, Jonathan D. Dobson, Stephen W. P...