Sciweavers

4564 search results - page 664 / 913
» Data Integration Using ID-Logic
Sort
View
EDBT
2009
ACM
136views Database» more  EDBT 2009»
15 years 9 months ago
On the comparison of microdata disclosure control algorithms
Privacy models such as k-anonymity and -diversity typically offer an aggregate or scalar notion of the privacy property that holds collectively on the entire anonymized data set....
Rinku Dewri, Indrajit Ray, Indrakshi Ray, Darrell ...
151
Voted
UIC
2009
Springer
15 years 9 months ago
Context-Aware Activity Recognition through a Combination of Ontological and Statistical Reasoning
Abstract. In the last years, techniques for activity recognition have attracted increasing attention. Among many applications, a special interest is in the pervasive e-Health domai...
Daniele Riboni, Claudio Bettini
COCOON
2005
Springer
15 years 8 months ago
Quartet-Based Phylogeny Reconstruction from Gene Orders
Abstract. Phylogenetic reconstruction from gene-rearrangement data is attracting increasing attention from biologists and computer scientists. Methods used in reconstruction includ...
Tao Liu, Jijun Tang, Bernard M. E. Moret
PODS
2010
ACM
173views Database» more  PODS 2010»
15 years 7 months ago
Foundations of schema mapping management
In the last few years, a lot of attention has been paid to the specification and subsequent manipulation of schema mappings, a problem which is of fundamental importance in metad...
Marcelo Arenas, Jorge Pérez, Juan L. Reutte...
127
Voted
CODES
2004
IEEE
15 years 6 months ago
Operation tables for scheduling in the presence of incomplete bypassing
Register bypassing is a powerful and widely used feature in modern processors to eliminate certain data hazards. Although complete bypassing is ideal for performance, bypassing ha...
Aviral Shrivastava, Eugene Earlie, Nikil D. Dutt, ...