Sciweavers

239 search results - page 37 / 48
» Reusing Model Transformations While Preserving Properties
Sort
View
SAC
2010
ACM
15 years 2 months ago
User-controlled generalization boundaries for p-sensitive k-anonymity
Numerous privacy models based on the k-anonymity property have been introduced in the last few years. While differing in their methods and quality of their results, they all focus...
Alina Campan, Traian Marius Truta, Nicholas Cooper
JSYML
2008
95views more  JSYML 2008»
14 years 9 months ago
Examples of non-locality
free but not Whitehead Abelian groups to construct Abstract Elementary Classes (AEC) which satisfy the amalgamation property but fail various conditions on the locality of Galois-...
John T. Baldwin, Saharon Shelah
ICVGIP
2004
14 years 11 months ago
Cursive Word Recognition Using a Novel Feature Extraction Method and a Neural Network
In this paper, we present a holistic system for the recognition of cursive handwriting that utilizes a novel feature extraction method and a neural network. The Hough transform is...
José Ruiz-Pinales, René Jaime-Rivas
91
Voted
OTM
2005
Springer
15 years 3 months ago
GeRoMe: A Generic Role Based Metamodel for Model Management
Abstract. The goal of Model Management is the development of new technologies and mechanisms to support the integration, evolution and matching of models. Such tasks are to be perf...
David Kensche, Christoph Quix, Mohamed Amine Chatt...
94
Voted
DEXA
2009
Springer
151views Database» more  DEXA 2009»
15 years 4 months ago
Automatic Extraction of Ontologies Wrapping Relational Data Sources
Describing relational data sources (i.e. databases) by means of ontologies constitutes the foundation of most of the semantic based approaches to data access and integration. In sp...
Lina Lubyte, Sergio Tessaris