Sciweavers

676 search results - page 90 / 136
» More Efficient Object Serialization
Sort
View
119
Voted
DAWAK
2006
Springer
15 years 3 months ago
Achieving k-Anonymity by Clustering in Attribute Hierarchical Structures
Abstract. Individual privacy will be at risk if a published data set is not properly de-identified. k-anonymity is a major technique to de-identify a data set. A more general view ...
Jiuyong Li, Raymond Chi-Wing Wong, Ada Wai-Chee Fu...
CPAIOR
2006
Springer
15 years 1 months ago
Conflict-Directed A* Search for Soft Constraints
As many real-world problems involve user preferences, costs, or probabilities, constraint satisfaction has been extended to optimization by generalizing hard constraints to soft co...
Martin Sachenbacher, Brian C. Williams
PTS
2007
144views Hardware» more  PTS 2007»
15 years 1 months ago
Component Testing Is Not Enough - A Study of Software Faults in Telecom Middleware
The interrelationship between software faults and failures is quite intricate and obtaining a meaningful characterization of it would definitely help the testing community in decid...
Sigrid Eldh, Sasikumar Punnekkat, Hans Hansson, Pe...
AIPS
2006
15 years 1 months ago
Plan Stability: Replanning versus Plan Repair
The ultimate objective in planning is to construct plans for execution. However, when a plan is executed in a real environment it can encounter differences between the expected an...
Maria Fox, Alfonso Gerevini, Derek Long, Ivan Seri...
MM
2010
ACM
132views Multimedia» more  MM 2010»
15 years 3 days ago
One person labels one million images
Targeting the same objective of alleviating the manual work as automatic annotation, in this paper, we propose a novel framework with minimal human effort to manually annotate a l...
Jinhui Tang, Qiang Chen, Shuicheng Yan, Tat-Seng C...