Sciweavers

1522 search results - page 142 / 305
» Practical Exception Specifications
Sort
View
DAC
2000
ACM
16 years 2 months ago
System chip test: how will it impact your design?
A major challenge in realizing core-based system chips is the adoption and design-in of adequate test and diagnosis strategies. This tutorial paper discusses the specific challeng...
Yervant Zorian, Erik Jan Marinissen
ICML
2008
IEEE
16 years 2 months ago
Graph kernels between point clouds
Point clouds are sets of points in two or three dimensions. Most kernel methods for learning on sets of points have not yet dealt with the specific geometrical invariances and pra...
Francis R. Bach
WWW
2007
ACM
16 years 2 months ago
Wherefore art thou r3579x?: anonymized social networks, hidden patterns, and structural steganography
In a social network, nodes correspond to people or other social entities, and edges correspond to social links between them. In an effort to preserve privacy, the practice of anon...
Lars Backstrom, Cynthia Dwork, Jon M. Kleinberg
KDD
2008
ACM
175views Data Mining» more  KDD 2008»
16 years 2 months ago
Geocode Matching and Privacy Preservation
Geocoding is the process of matching addresses to geographic locations, such as latitudes and longitudes, or local census areas. In many applications, addresses are the key to geo-...
Peter Christen
CHI
2007
ACM
16 years 2 months ago
A game design methodology to incorporate social activist themes
Can a set of articulated and tested methodologies be created whose endpoint is the reliable capacity for taking activist social themes into account? In this paper we explore a var...
Mary Flanagan, Helen Nissenbaum