Sciweavers

2340 search results - page 30 / 468
» Data abstraction and information hiding
Sort
View
CAPTECH
1998
Springer
13 years 11 months ago
Motion Abstraction and Mapping with Spatial Constraints
bstraction and Mapping with Spatial Constraints ? Rama Bindiganavale and Norman I. Badler Computer and Information Science Department University of Pennsylvania, PA 19104-6389, USA...
Rama Bindiganavale, Norman I. Badler
IJNSEC
2008
113views more  IJNSEC 2008»
13 years 7 months ago
A Fragile Associative Watermarking on 2D Barcode for Data Authentication
Two-dimensional (2D) barcode has improved the information encoded capacity, and it also has enriched the applications of barcode technique. Recently, there are researches dealing ...
Jau-Ji Shen, Po-Wei Hsu
ICPP
2003
IEEE
14 years 26 days ago
Running Bag-of-Tasks Applications on Computational Grids: The MyGrid Approach
e some simple working environment abstractions that hide the configuration heterogeneity of the machines that compose the grid from the user. Second, we introduce Work Queue with R...
Walfredo Cirne, Daniel Paranhos da Silva, Lauro Co...
KDD
2006
ACM
128views Data Mining» more  KDD 2006»
14 years 8 months ago
On privacy preservation against adversarial data mining
Privacy preserving data processing has become an important topic recently because of advances in hardware technology which have lead to widespread proliferation of demographic and...
Charu C. Aggarwal, Jian Pei, Bo Zhang 0002
OSDI
2008
ACM
14 years 7 months ago
Digging for Data Structures
Because writing computer programs is hard, computer programmers are taught to use encapsulation and modularity to hide complexity and reduce the potential for errors. Their progra...
Anthony Cozzie, Frank Stratton, Hui Xue, Samuel T....