Sciweavers

4303 search results - page 44 / 861
» Are We There Yet
Sort
View
SSDBM
2007
IEEE
105views Database» more  SSDBM 2007»
15 years 7 months ago
Maintaining K-Anonymity against Incremental Updates
K-anonymity is a simple yet practical mechanism to protect privacy against attacks of re-identifying individuals by joining multiple public data sources. All existing methods achi...
Jian Pei, Jian Xu, Zhibin Wang, Wei Wang 0009, Ke ...
ICSE
2003
IEEE-ACM
16 years 25 days ago
Architecture, Design, Implementation
The terms architecture, design, and implementation are typically used informally in partitioning software specificato three coarse strata of abstraction. Yet these strata are not ...
Amnon H. Eden, Rick Kazman
CISIS
2010
IEEE
15 years 7 months ago
A Multidimensional Array Slicing DSL for Stream Programming
—Stream languages offer a simple multi-core programming model and achieve good performance. Yet expressing data rearrangement patterns (like a matrix block decomposition) in thes...
Pablo de Oliveira Castro, Stéphane Louise, ...
87
Voted
AGILEDC
2008
IEEE
15 years 7 months ago
The Intermediate Customer Anti-Pattern
Scrum focuses on collaboration with the customer, but what if your customer is actually a provider for yet another customer? Then who is your real customer? What if these two poss...
Tom Perry
91
Voted
ICARCV
2008
IEEE
188views Robotics» more  ICARCV 2008»
15 years 7 months ago
Achievable safety of driverless ground vehicles
—Safety is an important issue of driverless car. Yet, most current approaches fail to ensure safety even in a fully informed situation. In this paper we discuss how the safety cr...
Rodrigo Benenson, Thierry Fraichard, Michel Parent