Sciweavers

1779 search results - page 301 / 356
» A Formal Model of Data Privacy
Sort
View
JSS
2002
101views more  JSS 2002»
15 years 3 months ago
Software requirements validation via task analysis
As a baseline for software development, a correct and complete requirements definition is one foundation of software quality. Previously, a novel approach to static testing of sof...
Hong Zhu, Lingzi Jin, Dan Diaper, Ganghong Bai
SAC
2008
ACM
15 years 3 months ago
Sensor stream reduction for clustered wireless sensor networks
This work presents the use of sensor stream reduction algorithms in clustered wireless sensor networks (WSNs), where the cluster head node is responsible to reduce the amount of d...
André L. L. de Aquino, Carlos Mauricio S. F...
CORR
2010
Springer
117views Education» more  CORR 2010»
15 years 1 months ago
An Optimal Lower Bound on the Communication Complexity of Gap-Hamming-Distance
We prove an optimal (n) lower bound on the randomized communication complexity of the much-studied GAP-HAMMING-DISTANCE problem. As a consequence, we obtain essentially optimal mu...
Amit Chakrabarti, Oded Regev
TIT
2010
125views Education» more  TIT 2010»
14 years 10 months ago
Target detection via network filtering
A method of `network filtering' has been proposed recently to detect the effects of certain external perturbations on the interacting members in a network. However, with larg...
Shu Yang, Eric D. Kolaczyk
AIME
2011
Springer
14 years 3 months ago
A Constraint Logic Programming Approach to Identifying Inconsistencies in Clinical Practice Guidelines for Patients with Comorbi
This paper describes a novel methodological approach to identifying inconsistencies when concurrently using multiple clinical practice guidelines. We discuss how to construct a for...
Martin Michalowski, Marisela Mainegra Hing, Szymon...