Sciweavers

5344 search results - page 338 / 1069
» Privacy-Preserving Set Operations
Sort
View
PPDP
2009
Springer
15 years 11 months ago
An embedded declarative data transformation language
We introduce a logic programming framework for data type transformations based on isomorphisms between elementary data types (natural numbers, finite functions, sets and permutat...
Paul Tarau
JTRES
2009
ACM
15 years 11 months ago
Real time Java on resource-constrained platforms with Fiji VM
Real-time Java is quickly emerging as a platform for building safety-critical embedded systems. The real-time variants of Java, including [8, 15], are attractive alternatives to A...
Filip Pizlo, Lukasz Ziarek, Jan Vitek
ICDM
2008
IEEE
107views Data Mining» more  ICDM 2008»
15 years 11 months ago
GeoDMA - A Novel System for Spatial Data Mining
Although a huge amount of remote sensing data has been provided by Earth observation satellites, few data manipulation techniques and information extraction in large data sets hav...
Thales Sehn Korting, Leila Maria Garcia Fonseca, M...
VTC
2008
IEEE
15 years 11 months ago
Finding the Best QoS Path in a Gilbert Channel Network
—Many different types of modern wired and wireless communication links can be mathematically described as discretebert channels. In this extended abstract, we present an exact me...
Edwin Soedarmadji
LICS
2007
IEEE
15 years 11 months ago
On Noetherian Spaces
A topological space is Noetherian iff every open is compact. Our starting point is that this notion generalizes that of well-quasi order, in the sense that an Alexandroff-discrete...
Jean Goubault-Larrecq