K-anonymity is a simple yet practical mechanism to protect privacy against attacks of re-identifying individuals by joining multiple public data sources. All existing methods achi...
Jian Pei, Jian Xu, Zhibin Wang, Wei Wang 0009, Ke ...
The terms architecture, design, and implementation are typically used informally in partitioning software specificato three coarse strata of abstraction. Yet these strata are not ...
—Stream languages offer a simple multi-core programming model and achieve good performance. Yet expressing data rearrangement patterns (like a matrix block decomposition) in thes...
Scrum focuses on collaboration with the customer, but what if your customer is actually a provider for yet another customer? Then who is your real customer? What if these two poss...
—Safety is an important issue of driverless car. Yet, most current approaches fail to ensure safety even in a fully informed situation. In this paper we discuss how the safety cr...
Rodrigo Benenson, Thierry Fraichard, Michel Parent