Sciweavers

434 search results - page 59 / 87
» Security Documentation
Sort
View
123
Voted
EDBT
2012
ACM
262views Database» more  EDBT 2012»
13 years 2 months ago
The application of differential privacy to health data
Differential privacy has gained a lot of attention in recent years as a general model for the protection of personal information when used and disclosed for secondary purposes. It...
Fida Kamal Dankar, Khaled El Emam
99
Voted
OOPSLA
2009
Springer
15 years 7 months ago
Reimagining literate programming
In this paper we describe Ginger, a new language with first class support for literate programming. Literate programming refers to a philosophy that argues computer programs shou...
James Dean Palmer, Eddie Hillenbrand
PVLDB
2010
129views more  PVLDB 2010»
14 years 11 months ago
AXART - Enabling Collaborative Work with AXML Artifacts
The workflow models have been essentially operation-centric for many years, ignoring almost completely the data aspects. Recently, a new paradigm of data-centric workflows, call...
Bogdan Marinoiu, Serge Abiteboul, Pierre Bourhis, ...
121
Voted
IMCSIT
2010
14 years 9 months ago
The development features of the face recognition system
Nowadays personal identification is a very important issue. There is a wide range of applications in different spheres, such as video surveillance security systems, control of docu...
Rauf Sadykhov, Igor Frolov
101
Voted
ACISP
1997
Springer
15 years 4 months ago
Enabling Technology for the Trading of MPEG-encoded Video
tracts, pp. 11-17. (http://www.qucis.queens.ca/achallc97/papers/p028.html) Alexa, Melina; Rostek, Lothar Pattern Concordances - TATOE calls XGrammar. Presented at ACH -ALLC97, King...
Jana Dittmann, Arnd Steinmetz