Sciweavers

575 search results - page 80 / 115
» constraints 2011
Sort
View
PVLDB
2011
14 years 6 months ago
Column-Oriented Storage Techniques for MapReduce
Users of MapReduce often run into performance problems when they scale up their workloads. Many of the problems they encounter can be overcome by applying techniques learned from ...
Avrilia Floratou, Jignesh M. Patel, Eugene J. Shek...
TDSC
2011
14 years 6 months ago
CASTLE: Continuously Anonymizing Data Streams
— Most of existing privacy preserving techniques, such as k-anonymity methods, are designed for static data sets. As such, they cannot be applied to streaming data which are cont...
Jianneng Cao, Barbara Carminati, Elena Ferrari, Ki...
TFS
2011
264views Education» more  TFS 2011»
14 years 6 months ago
Information Granularity in Fuzzy Binary GrC Model
—Zadeh’s seminal work in theory of fuzzy-information3 granulation in human reasoning is inspired by the ways in which4 humans granulate information and reason with it. This has...
Yuhua Qian, Jiye Liang, W.-z. Z. Wu, Chuangyin Dan...
TII
2011
206views Education» more  TII 2011»
14 years 6 months ago
Timing-Failure Risk Assessment of UML Design Using Time Petri Net Bound Techniques
Abstract—Software systems that do not meet their timing constraints can cause risks. In this work, we propose a comprehensive method for assessing the risk of timing failure by e...
Simona Bernardi, Javier Campos, José Merseg...
WWW
2011
ACM
14 years 6 months ago
Analysis and tracking of emotions in english and bengali texts: a computational approach
The present discussion highlights the aspects of an ongoing doctoral thesis grounded on the analysis and tracking of emotions from English and Bengali texts. Development of lexica...
Dipankar Das