Sciweavers

137 search results - page 17 / 28
» Foundations for Extensible Objects with Roles
Sort
View
INFOCOM
2010
IEEE
13 years 5 months ago
Counting RFID Tags Efficiently and Anonymously
Radio Frequency IDentification (RFID) technology has attracted much attention due to its variety of applications, e.g., inventory control and object tracking. One important problem...
Hao Han, Bo Sheng, Chiu Chiang Tan, Qun Li, Weizhe...
OTM
2010
Springer
13 years 5 months ago
Towards Using Semantic Decision Tables for Organizing Data Semantics
In the ITEA2 Do-It-Yourself Smart Experiences project (DIY-SE), we are required to design an ontology-based ambient computing environment to support users to DIY their personalized...
Yan Tang
SAC
2009
ACM
14 years 2 months ago
Specifying and checking protocols of multithreaded classes
In the Design By Contract (DBC) approach, programmers specify methods with pre and postconditions (also called contracts). Earlier work added protocols to the DBC approach to desc...
Clément Hurlin
ICDM
2003
IEEE
98views Data Mining» more  ICDM 2003»
14 years 29 days ago
On the Privacy Preserving Properties of Random Data Perturbation Techniques
Privacy is becoming an increasingly important issue in many data mining applications. This has triggered the development of many privacy-preserving data mining techniques. A large...
Hillol Kargupta, Souptik Datta, Qi Wang, Krishnamo...
GLOBAL
2003
Springer
14 years 27 days ago
The Klaim Project: Theory and Practice
Klaim (Kernel Language for Agents Interaction and Mobility) is an experimental language specifically designed to program distributed systems consisting of several mobile component...
Lorenzo Bettini, Viviana Bono, Rocco De Nicola, Gi...