Sciweavers

679 search results - page 45 / 136
» Algorithmic modifications to SPIHT
Sort
View
173
Voted
DASFAA
2011
IEEE
341views Database» more  DASFAA 2011»
15 years 7 days ago
Utility-Oriented K-Anonymization on Social Networks
\Identity disclosure" problem on publishing social network data has gained intensive focus from academia. Existing k-anonymization algorithms on social network may result in n...
Yazhe WANG, Long XIE, Baihua ZHENG, and Ken C. K. ...
93
Voted
MICCAI
2009
Springer
16 years 3 months ago
Setting Priors and Enforcing Constraints on Matches for Nonlinear Registration of Meshes
Abstract. We show that a simple probabilistic modelling of the registration problem for surfaces allows to solve it by using standard clustering techniques. In this framework, poin...
Benoît Combès, Sylvain Prima
WWW
2007
ACM
16 years 3 months ago
Towards automating regression test selection for web services
This paper reports a safe regression test selection (RTS) approach that is designed for verifying Web services in an end-to-end manner. The Safe RTS technique has been integrated ...
Michael Ruth, Shengru Tu
92
Voted
WWW
2004
ACM
16 years 3 months ago
Computing personalized pageranks
A recently published approach to adaptive page rank, using the solution of quadratic optimization methods with a set of simple constraints [3], is modified to permit classificatio...
Franco Scarselli, Ah Chung Tsoi, Markus Hagenbuchn...
POPL
2005
ACM
16 years 2 months ago
Statically checking confidentiality via dynamic labels
This paper presents a new approach for verifying confidenfor programs, based on abstract interpretation. The framework is formally developed and proved correct in the theorem prov...
Bart Jacobs, Wolter Pieters, Martijn Warnier