Sciweavers

5234 search results - page 873 / 1047
» Method Components - Rationale Revealed
Sort
View
PAKDD
2007
ACM
130views Data Mining» more  PAKDD 2007»
15 years 10 months ago
Deriving Private Information from Arbitrarily Projected Data
Distance-preserving projection based perturbation has gained much attention in privacy-preserving data mining in recent years since it mitigates the privacy/accuracy tradeoff by ac...
Songtao Guo, Xintao Wu
SCALESPACE
2007
Springer
15 years 10 months ago
Linear Image Reconstruction by Sobolev Norms on the Bounded Domain
The reconstruction problem is usually formulated as a variational problem in which one searches for that image that minimizes a so called prior (image model) while insisting on cer...
Bart Janssen, Remco Duits, Bart M. ter Haar Romeny
152
Voted
APSEC
2006
IEEE
15 years 10 months ago
Adopting Model-Driven Development for Integrated Services and Appliances in Home Network Systems
The technology of a home network system (HNS) allows integration of several kinds of home appliances to provide a user with value-added integrated services. Development of the int...
Hiroshi Igaki, Masahide Nakamura, Ken-ichi Matsumo...
CIMCA
2006
IEEE
15 years 10 months ago
A Knowledge-based Security Policy Framework for Business Process Management
Business Process Management (BPM) is often a key component of the business change. Business rules, whether embedded within BPM or on their own, have begun playing an ever-increasi...
Dong Huang, Yi Yang, Jacques Calmet
CODES
2006
IEEE
15 years 10 months ago
A formal approach to robustness maximization of complex heterogeneous embedded systems
Embedded system optimization typically considers objectives such as cost, timing, buffer sizes and power consumption. Robustness criteria, i.e. sensitivity of the system to variat...
Arne Hamann, Razvan Racu, Rolf Ernst