Sciweavers

11345 search results - page 2204 / 2269
» Foundations of Computer Science
Sort
View
EDBTW
2010
Springer
15 years 6 months ago
A practice-oriented framework for measuring privacy and utility in data sanitization systems
Published data is prone to privacy attacks. Sanitization methods aim to prevent these attacks while maintaining usefulness of the data for legitimate users. Quantifying the trade-...
Michal Sramka, Reihaneh Safavi-Naini, Jörg De...
ECBS
2009
IEEE
164views Hardware» more  ECBS 2009»
15 years 6 months ago
Semantically Enhanced Containers for Concurrent Real-Time Systems
Future space missions, such as Mars Science Laboratory, are built upon computing platforms providing a high degree of autonomy and diverse functionality. The increased sophisticat...
Damian Dechev, Peter Pirkelbauer, Nicolas Rouquett...
ICALP
2009
Springer
15 years 6 months ago
Improved Bounds for Speed Scaling in Devices Obeying the Cube-Root Rule
Speed scaling is a power management technique that involves dynamically changing the speed of a processor. This gives rise to dualobjective scheduling problems, where the operating...
Nikhil Bansal, Ho-Leung Chan, Kirk Pruhs, Dmitriy ...
LICS
2009
IEEE
15 years 5 months ago
Ludics with Repetitions (Exponentials, Interactive Types and Completeness)
Abstract. Ludics is peculiar in the panorama of game semantics: we first have the definition of interaction-composition and then we have semantical types, as a set of strategies ...
Michele Basaldella, Claudia Faggian
BPM
2009
Springer
340views Business» more  BPM 2009»
15 years 5 months ago
Abstractions in Process Mining: A Taxonomy of Patterns
ions in Process Mining: A Taxonomy of Patterns R.P. Jagadeesh Chandra Bose1,2 and Wil M.P. van der Aalst1 1 Department of Mathematics and Computer Science, University of Technology...
R. P. Jagadeesh Chandra Bose, Wil M. P. van der Aa...
« Prev « First page 2204 / 2269 Last » Next »