Sciweavers

1138 search results - page 197 / 228
» Talking about concerns
Sort
View
POPL
2012
ACM
13 years 8 months ago
A language for automatically enforcing privacy policies
It is becoming increasingly important for applications to protect sensitive data. With current techniques, the programmer bears the burden of ensuring that the application’s beh...
Jean Yang, Kuat Yessenov, Armando Solar-Lezama
ICDE
2008
IEEE
563views Database» more  ICDE 2008»
17 years 16 days ago
Probabilistic Verifiers: Evaluating Constrained Nearest-Neighbor Queries over Uncertain Data
In applications like location-based services, sensor monitoring and biological databases, the values of the database items are inherently uncertain in nature. An important query fo...
Reynold Cheng, Jinchuan Chen, Mohamed F. Mokbel, C...
ECCV
1998
Springer
16 years 2 months ago
Multi-Step Procedures for the Localization of 2D and 3D Point Landmarks and Automatic ROI Size Selection
In this contribution, we are concerned with the detection and re ned localization of 3D point landmarks. We propose multi-step di erential procedures for subvoxel localization of 3...
Sönke Frantz, Karl Rohr, H. Siegfried Stiehl
100
Voted
SIGSOFT
2008
ACM
16 years 1 months ago
Requirements engineering: from craft to discipline
Getting the right software requirements under the right environment assumptions is a critical precondition for developing the right software. This task is intrinsically difficult....
Axel van Lamsweerde
87
Voted
WWW
2008
ACM
16 years 1 months ago
Recommending questions using the mdl-based tree cut model
The paper is concerned with the problem of question recommendation. Specifically, given a question as query, we are to retrieve and rank other questions according to their likelih...
Yunbo Cao, Huizhong Duan, Chin-Yew Lin, Yong Yu, H...