Sciweavers

43264 search results - page 8651 / 8653
» Comparing models of computation
Sort
View
EMSOFT
2011
Springer
12 years 8 months ago
Software certification: coding, code, and coders
We describe a certification approach for software development that has been adopted at our organization. JPL develops robotic spacecraft for the exploration of the solar system. T...
Klaus Havelund, Gerard J. Holzmann
IACR
2011
87views more  IACR 2011»
12 years 8 months ago
Is privacy compatible with truthfulness?
In the area of privacy-preserving data mining, a differentially private mechanism intuitively encourages people to share their data truthfully because they are at little risk of ...
David Xiao
SIGMOD
2012
ACM
220views Database» more  SIGMOD 2012»
11 years 11 months ago
GUPT: privacy preserving data analysis made easy
It is often highly valuable for organizations to have their data analyzed by external agents. However, any program that computes on potentially sensitive data risks leaking inform...
Prashanth Mohan, Abhradeep Thakurta, Elaine Shi, D...
ICDE
2012
IEEE
241views Database» more  ICDE 2012»
11 years 11 months ago
GeoFeed: A Location Aware News Feed System
Abstract—This paper presents the GeoFeed system; a locationaware news feed system that provides a new platform for its users to get spatially related message updates from either ...
Jie Bao 0003, Mohamed F. Mokbel, Chi-Yin Chow
ICDE
2012
IEEE
237views Database» more  ICDE 2012»
11 years 11 months ago
On Discovery of Traveling Companions from Streaming Trajectories
— The advance of object tracking technologies leads to huge volumes of spatio-temporal data collected in the form of trajectory data stream. In this study, we investigate the pro...
Lu An Tang, Yu Zheng, Jing Yuan, Jiawei Han, Alice...
« Prev « First page 8651 / 8653 Last » Next »