Sciweavers

1061 search results - page 106 / 213
» Integrity Constraints for Linked Data
Sort
View
SIGADA
2005
Springer
15 years 7 months ago
Experiences using SPARK in an undergraduate CS course
This paper describes experiences garnered while teaching a course on high integrity software using SPARK to a mix of junior and senior level undergraduates. The paper describes th...
Anthony S. Ruocco
CVPR
2005
IEEE
15 years 3 months ago
Articulated Structure from Motion by Factorization
Multibody affine Structure From Motion (SFM) methods commonly assume independent motion between objects such that the ‘measurement matrix’ has rank 4k. When multiple views ar...
Philip A. Tresadern, Ian D. Reid
ICDE
2008
IEEE
118views Database» more  ICDE 2008»
16 years 2 months ago
k-Anonymization Revisited
In this paper we introduce new notions of k-type anonymizations. Those notions achieve similar privacy goals as those aimed by Sweenie and Samarati when proposing the concept of k-...
Aristides Gionis, Arnon Mazza, Tamir Tassa
SAC
2009
ACM
15 years 6 months ago
Opportunistic real-time routing in multi-hop wireless sensor networks
Wireless sensor networks (WSNs) are subject to significant resource constraints. Particularly, routing protocols for lowrate WSNs suffer from maintaining routing metrics and sta...
Junwhan Kim, Binoy Ravindran
IV
2008
IEEE
100views Visualization» more  IV 2008»
15 years 8 months ago
An Interactive Map of Semantic Web Ontology Usage
Publishing information on the Semantic Web using common formats enables data to be linked together, integrated and reused. In order to fully leverage the potential for interlinkin...
Sheila Kinsella, Uldis Bojars, Andreas Harth, John...