Sciweavers

433 search results - page 74 / 87
» Contracts: From Analysis to C Implementation
Sort
View
VLDB
2005
ACM
136views Database» more  VLDB 2005»
15 years 3 months ago
On k-Anonymity and the Curse of Dimensionality
In recent years, the wide availability of personal data has made the problem of privacy preserving data mining an important one. A number of methods have recently been proposed fo...
Charu C. Aggarwal
PERCOM
2006
ACM
15 years 9 months ago
Exploiting information relationships for access control in pervasive computing
Many information services in pervasive computing offer rich information, which is information that includes other types of information. For example, the information listed in a pe...
Urs Hengartner, Peter Steenkiste
84
Voted
ICC
2008
IEEE
126views Communications» more  ICC 2008»
15 years 4 months ago
Discovering Packet Structure through Lightweight Hierarchical Clustering
— The complexity of current Internet applications makes the understanding of network traffic a challenging task. By providing larger-scale aggregates for analysis, unsupervised ...
Abdulrahman Hijazi, Hajime Inoue, Ashraf Matrawy, ...
OOPSLA
2007
Springer
15 years 3 months ago
A rewriting approach to the design and evolution of object-oriented languages
Abstract. Object-oriented language concepts have been highly successful, resulting in a large number of object-oriented languages and language extensions. Unfortunately, formal met...
Mark Hills, Grigore Rosu
74
Voted
MM
2004
ACM
142views Multimedia» more  MM 2004»
15 years 3 months ago
Parsing and browsing tools for colonoscopy videos
Colonoscopy is an important screening tool for colorectal cancer. During a colonoscopic procedure, a tiny video camera at the tip of the endoscope generates a video signal of the ...
Yu Cao, Dalei Li, Wallapak Tavanapong, Jung-Hwan O...