Sciweavers

18306 search results - page 3146 / 3662
» Algorithmics in Exponential Time
Sort
View
139
Voted
SAS
2004
Springer
109views Formal Methods» more  SAS 2004»
15 years 10 months ago
Pointer-Range Analysis
Array-Range Analysis computes at compile time the range of possible index values for each array-index expression in a program. This information can be used to detect potential out-...
Suan Hsi Yong, Susan Horwitz
154
Voted
SDMW
2004
Springer
15 years 10 months ago
Experimental Analysis of Privacy-Preserving Statistics Computation
The recent investigation of privacy-preserving data mining and other kinds of privacy-preserving distributed computation has been motivated by the growing concern about the privacy...
Hiranmayee Subramaniam, Rebecca N. Wright, Zhiqian...
147
Voted
SEM
2004
Springer
15 years 10 months ago
Experience with Lightweight Distributed Component Technologies in Business Intelligence Systems
Business Intelligence (BI) systems address the demands of large scale enterprises for operational analytics, management information and decision support tasks. Building such applic...
Leticia Duboc, Tony Wicks, Wolfgang Emmerich
VECPAR
2004
Springer
15 years 10 months ago
Dynamically Adaptive Binomial Trees for Broadcasting in Heterogeneous Networks of Workstations
Binomial trees have been used extensively for broadcasting in clusters of workstations. In the case of heterogeneous nondedicated clusters and grid environments, the broadcasting o...
Silvia M. Figueira, Christine Mendes
VLDB
2004
ACM
113views Database» more  VLDB 2004»
15 years 10 months ago
Auditing Compliance with a Hippocratic Database
We introduce an auditing framework for determining whether a database system is adhering to its data disclosure policies. Users formulate audit expressions to specify the (sensiti...
Rakesh Agrawal, Roberto J. Bayardo Jr., Christos F...
« Prev « First page 3146 / 3662 Last » Next »