Sciweavers

7434 search results - page 169 / 1487
» Still
Sort
View
154
Voted
EDBT
2008
ACM
154views Database» more  EDBT 2008»
16 years 4 months ago
Data utility and privacy protection trade-off in k-anonymisation
K-anonymisation is an approach to protecting privacy contained within a dataset. A good k-anonymisation algorithm should anonymise a dataset in such a way that private information...
Grigorios Loukides, Jianhua Shao
146
Voted
ICIAP
2007
ACM
16 years 4 months ago
Video Objects Segmentation by Robust Background Modeling
This paper deals with the problem of segmenting a video shot into a background (still) mosaic and one or more foreground moving objects. The method is based on ego-motion compensa...
Andrea Colombari, Andrea Fusiello, Vittorio Murino
ICSE
2003
IEEE-ACM
16 years 4 months ago
Teaching Contract Programming Concepts to Future Software Engineers
Current research in software engineering at Karlstad University is concentrated on non-formal software design methods with a focus on semantics. One goal is to produce methods, wh...
Donald F. Ross
ICSE
2008
IEEE-ACM
16 years 4 months ago
Benefits of interactive display environments in the software development process
Models become increasingly important for software development processes. Though there is a multitude of software modeling tools available, the handling of diagrams is still diffic...
Mathias Frisch, Raimund Dachselt
ICFP
2004
ACM
16 years 4 months ago
Types for path correctness of XML queries
d Abstract) Dario Colazzo1 , Giorgio Ghelli2 , Paolo Manghi2 , and Carlo Sartiani2 1 LRI - Universit?e Paris Sud 2 Dipartimento di Informatica - Universit`a di Pisa If a subexpress...
Dario Colazzo, Giorgio Ghelli, Paolo Manghi, Carlo...