Sciweavers

5255 search results - page 1029 / 1051
» Formal Methods for Privacy
Sort
View
VLDB
1998
ACM
192views Database» more  VLDB 1998»
13 years 12 months ago
Algorithms for Mining Distance-Based Outliers in Large Datasets
This paper deals with finding outliers (exceptions) in large, multidimensional datasets. The identification of outliers can lead to the discovery of truly unexpected knowledge in ...
Edwin M. Knorr, Raymond T. Ng
SIGMOD
1996
ACM
132views Database» more  SIGMOD 1996»
13 years 12 months ago
Cost-Based Optimization for Magic: Algebra and Implementation
Magic sets rewriting is a well-known optimization heuristic for complex decision-support queries. There can be many variants of this rewriting even for a single query, which diffe...
Praveen Seshadri, Joseph M. Hellerstein, Hamid Pir...
RE
1997
Springer
13 years 11 months ago
Requirements Models in Context
The field of requirements engineering emerges out of tradition of research and engineering practice that stresses rtance of generalizations and abstractions. abstraction is essent...
Colin Potts
APN
1993
Springer
13 years 11 months ago
Coloured Petri Nets Extended with Place Capacities, Test Arcs and Inhibitor Arcs
In this paper we show how to extend Coloured Petri Nets (CP-nets), with three new modelling primitives—place capacities, test arcs and inhibitor arcs. The new modelling primitiv...
Søren Christensen, Niels Damgaard Hansen
DAC
1994
ACM
13 years 11 months ago
A Communicating Petri Net Model for the Design of Concurrent Asynchronous Modules
Current asynchronous tools are focussed mainly on the design of a single interface module. In many applications, one must design interacting interface modules that potentially comm...
Gjalt G. de Jong, Bill Lin
« Prev « First page 1029 / 1051 Last » Next »