Sciweavers

549 search results - page 78 / 110
» On the Complexity of Restricted k-anonymity Problem
Sort
View
ICDE
2009
IEEE
173views Database» more  ICDE 2009»
15 years 11 months ago
Differencing Provenance in Scientific Workflows
Abstract-- Scientific workflow management systems are increaingly providing the ability to manage and query the provenance of data products. However, the problem of differencing th...
Zhuowei Bao, Sarah Cohen Boulakia, Susan B. Davids...
DAC
2002
ACM
15 years 10 months ago
Schedulability of event-driven code blocks in real-time embedded systems
Many real-time embedded systems involve a collection of independently executing event-driven code blocks, having hard real-time constraints. Tasks in many such systems, like netwo...
Samarjit Chakraborty, Thomas Erlebach, Simon K&uum...
CSFW
2006
IEEE
15 years 3 months ago
Policy Analysis for Administrative Role Based Access Control
Role-Based Access Control (RBAC) is a widely used model for expressing access control policies. In large organizations, the RBAC policy may be collectively managed by many adminis...
Amit Sasturkar, Ping Yang, Scott D. Stoller, C. R....
ICRA
2006
IEEE
93views Robotics» more  ICRA 2006»
15 years 3 months ago
A SVM-based Method for Engine Maintenance Strategy Optimization
— Due to the abundant application background, the optimization of maintenance problem has been extensively studied in the past decades. Besides the well-known difficulty of larg...
Qing-Shan Jia, Qianchuan Zhao
CRV
2005
IEEE
201views Robotics» more  CRV 2005»
15 years 3 months ago
Minimum Bayes Error Features for Visual Recognition by Sequential Feature Selection and Extraction
The extraction of optimal features, in a classification sense, is still quite challenging in the context of large-scale classification problems (such as visual recognition), inv...
Gustavo Carneiro, Nuno Vasconcelos