Sciweavers

2925 search results - page 403 / 585
» Information Complexity of Online Problems
Sort
View
VLDB
2005
ACM
114views Database» more  VLDB 2005»
15 years 10 months ago
Checking for k-Anonymity Violation by Views
When a private relational table is published using views, secrecy or privacy may be violated. This paper uses a formally-defined notion of k-anonymity to measure disclosure by vi...
Chao Yao, Xiaoyang Sean Wang, Sushil Jajodia
AIS
2004
Springer
15 years 9 months ago
Proposal of High Level Architecture Extension
The paper proposes three dimensional extension to High Level ARchitecture (HLA) and Runtime Infrastructure (RTI) to solve several issues such as security, information hiding proble...
Jae-Hyun Kim, Tag Gon Kim
WER
2004
Springer
15 years 9 months ago
Enhancing Requirements to derive Multi-Agent Architectures
Software systems of today are characterized by the increasing size, complexity, distribution and heterogeneity. Understanding and supporting the interaction between software requir...
Lúcia R. D. Bastos, Jaelson Brelaz de Castr...
CCGRID
2003
IEEE
15 years 9 months ago
MAGNET: A Tool for Debugging, Analyzing and Adapting Computing Systems
As computing systems grow in complexity, the cluster and grid communities require more sophisticated tools to diagnose, debug and analyze such systems. We have developed a toolkit...
Mark K. Gardner, Wu-chun Feng, Michael Broxton, Ad...
ICSM
2003
IEEE
15 years 9 months ago
Reverse Engineering of the Interaction Diagrams from C++ Code
In object oriented programming, the functionalities of a system result from the interactions (message exchanges) among the objects allocated by the system. While designing object ...
Paolo Tonella, Alessandra Potrich