Sciweavers

551 search results - page 74 / 111
» Preventing existence
Sort
View
DMIN
2009
222views Data Mining» more  DMIN 2009»
14 years 9 months ago
P-Sensitive K-Anonymity for Social Networks
-- The proliferation of social networks, where individuals share private information, has caused, in the last few years, a growth in the volume of sensitive data being stored in th...
Roy Ford, Traian Marius Truta, Alina Campan
ICIW
2009
IEEE
14 years 9 months ago
Toward an Integrated Ontology for Web Services
The lack of semantics in Web Services Description Language (WSDL) prevents automatic discovery and hence automatic invocation and composition. In our work, we are interested in ext...
Yassin Chabeb, Samir Tata, Djamel Belaïd
CJ
2010
150views more  CJ 2010»
14 years 9 months ago
Program Analysis Probably Counts
Abstract. Semantics-based program analysis uses an abstract semantics of programs/systems to statically determine run-time properties. Classic examples from compiler technology inc...
Alessandra Di Pierro, Chris Hankin, Herbert Wiklic...
CONEXT
2010
ACM
14 years 9 months ago
Declarative configuration management for complex and dynamic networks
Abstract-- Network management and operations are complicated, tedious, and error-prone, requiring significant human involvement and domain knowledge. As the complexity involved ine...
Xu Chen, Yun Mao, Zhuoqing Morley Mao, Jacobus E. ...
ENTCS
2010
118views more  ENTCS 2010»
14 years 9 months ago
Systematic Refinement of Performance Models for Concurrent Component-based Systems
Model-driven performance prediction methods require detailed design models to evaluate the performance of software systems during early development stages. However, the complexity...
Lucia Kapová, Steffen Becker