Sciweavers

1207 search results - page 79 / 242
» Towards optimal k-anonymization
Sort
View
GECCO
2007
Springer
155views Optimization» more  GECCO 2007»
15 years 7 months ago
Towards clustering with XCS
This paper presents a novel approach to clustering using an accuracy-based Learning Classifier System. Our approach achieves this by exploiting the generalization mechanisms inher...
Kreangsak Tamee, Larry Bull, Ouen Pinngern
96
Voted
EUROMICRO
2006
IEEE
15 years 6 months ago
Towards Ethernet-Based Wireless Mesh Networks for Fast Moving Users
In this paper we examine the capabilities of Switched Ethernet for building wireless mesh networks (WMNs) and more specific for the support of fast moving users. We will motivate...
Filip De Greve, Wim Vandenberghe, Filip De Turck, ...
90
Voted
GMP
2006
IEEE
114views Solid Modeling» more  GMP 2006»
15 years 6 months ago
A Step Towards Automated Design of Side Actions in Injection Molding of Complex Parts
Side actions contribute to mold cost by resulting in an additional manufacturing and assembly cost as well as by increasing the molding cycle time. Therefore, generating shapes of ...
Ashis Gopal Banerjee, Satyandra K. Gupta
IEEECIT
2006
IEEE
15 years 6 months ago
Towards Balancing Data Usefulness and Privacy Protection in K-Anonymisation
K-anonymisation, as an approach to protecting data privacy, has received much recent attention from the database research community. Given a single table, there can be many ways t...
Grigorios Loukides, Jianhua Shao
ISMVL
2006
IEEE
109views Hardware» more  ISMVL 2006»
15 years 6 months ago
Towards Solving Many-Valued MaxSAT
We define the MaxSAT problem for many-valued CNF formulas, called many-valued MaxSAT, and establish its complexity class. We then describe a basic branch and bound algorithm for ...
Josep Argelich, Xavier Domingo, Chu Min Li, Felip ...