Sciweavers

381 search results - page 44 / 77
» Domain Analysis for Transformational Reuse
Sort
View
WPES
2003
ACM
15 years 2 months ago
Analysis of privacy preserving random perturbation techniques: further explorations
Privacy is becoming an increasingly important issue in many data mining applications, particularly in the security and defense area. This has triggered the development of many pri...
Haimonti Dutta, Hillol Kargupta, Souptik Datta, Kr...
SSDBM
2009
IEEE
116views Database» more  SSDBM 2009»
15 years 4 months ago
Constraint-Based Learning of Distance Functions for Object Trajectories
Abstract. With the drastic increase of object trajectory data, the analysis and exploration of trajectories has become a major research focus with many applications. In particular,...
Wei Yu, Michael Gertz
88
Voted
HICSS
2008
IEEE
130views Biometrics» more  HICSS 2008»
15 years 4 months ago
Enterprise Modeling for Information System Development within MDA
Object-oriented analysis suggests semiformal usecase driven techniques for problem domain modeling from a computation independent viewpoint. The proposed approach called Topologic...
Janis Osis, Erika Asnina
BTW
2007
Springer
123views Database» more  BTW 2007»
15 years 3 months ago
Data Provenance: A Categorization of Existing Approaches
: In many application areas like e-science and data-warehousing detailed information about the origin of data is required. This kind of information is often referred to as data pro...
Boris Glavic, Klaus R. Dittrich
DOCENG
2006
ACM
15 years 3 months ago
Fast and simple XML tree differencing by sequence alignment
With the advent of XML we have seen a renewed interest in methods for computing the difference between trees. Methods that include heuristic elements play an important role in pr...
Tancred Lindholm, Jaakko Kangasharju, Sasu Tarkoma