The goal of this paper is to permit secure outsourced system evaluation. We propose a method for generating synthetic databases and obfuscating a workload of queries in order to pr...
Requirements views, such as coverage and status views, are an important asset for monitoring and managing software development. We have developed a method that automates the proce...
Abstract. Personal Information Management (PIM) systems aim to provide convenient access to all data and metadata on a desktop to the user itself as well as the co-workers. Obvious...
Ekaterini Ioannou, Juri Luca De Coi, Arne Wolf Koe...
This paper presents a framework for data modeling ntic abstraction of image/video data. The framework is based on spatio-temporalinformation associated with salient objects in an ...
Young Francis Day, Serhan Dagtas, Mitsutoshi Iino,...
Many applications depend on efficient management of large sets of distinct strings in memory. For example, during index construction for text databases a record is held for each d...