Sciweavers

4693 search results - page 897 / 939
» Verifying Hybrid Systems
Sort
View
149
Voted
IHI
2010
197views Healthcare» more  IHI 2010»
14 years 7 months ago
Beyond safe harbor: automatic discovery of health information de-identification policy alternatives
Regulations in various countries permit the reuse of health information without patient authorization provided the data is "de-identified". In the United States, for ins...
Kathleen Benitez, Grigorios Loukides, Bradley Mali...
MSR
2011
ACM
14 years 3 months ago
Do time of day and developer experience affect commit bugginess
Modern software is often developed over many years with hundreds of thousands of commits. Commit metadata is a rich source of social characteristics, including the commit’s time...
Jon Eyolfson, Lin Tan, Patrick Lam
POPL
2011
ACM
14 years 3 months ago
Making prophecies with decision predicates
We describe a new algorithm for proving temporal properties expressed in LTL of infinite-state programs. Our approach takes advantage of the fact that LTL properties can often be...
Byron Cook, Eric Koskinen
SIGMOD
2011
ACM
189views Database» more  SIGMOD 2011»
14 years 3 months ago
We challenge you to certify your updates
Correctness of data residing in a database is vital. While integrity constraint enforcement can often ensure data consistency, it is inadequate to protect against updates that inv...
Su Chen, Xin Luna Dong, Laks V. S. Lakshmanan, Div...
SIGMOD
2011
ACM
205views Database» more  SIGMOD 2011»
14 years 3 months ago
Interaction between record matching and data repairing
Central to a data cleaning system are record matching and data repairing. Matching aims to identify tuples that refer to the same real-world object, and repairing is to make a dat...
Wenfei Fan, Jianzhong Li, Shuai Ma, Nan Tang, Weny...