Sciweavers

811 search results - page 153 / 163
» Integrating Formal Description Techniques
Sort
View
EDBT
2009
ACM
136views Database» more  EDBT 2009»
14 years 2 months ago
On the comparison of microdata disclosure control algorithms
Privacy models such as k-anonymity and -diversity typically offer an aggregate or scalar notion of the privacy property that holds collectively on the entire anonymized data set....
Rinku Dewri, Indrajit Ray, Indrakshi Ray, Darrell ...
PLDI
2009
ACM
14 years 2 months ago
TAJ: effective taint analysis of web applications
Taint analysis, a form of information-flow analysis, establishes whether values from untrusted methods and parameters may flow into security-sensitive operations. Taint analysis...
Omer Tripp, Marco Pistoia, Stephen J. Fink, Manu S...
IJIIDS
2008
201views more  IJIIDS 2008»
13 years 7 months ago
MALEF: Framework for distributed machine learning and data mining
: Growing importance of distributed data mining techniques has recently attracted attention of researchers in multiagent domain. Several agent-based application have been already c...
Jan Tozicka, Michael Rovatsos, Michal Pechoucek, S...
DEDS
2000
83views more  DEDS 2000»
13 years 7 months ago
Synthesis of Discrete-Event Controllers Based on the Signal Environment
In this paper, we present the integration of controller synthesis techniques in the SIGNAL environment through the description of a tool dedicated to the incremental construction o...
Hervé Marchand, Patricia Bournai, Michel Le...
ICDE
2007
IEEE
99views Database» more  ICDE 2007»
14 years 8 months ago
Source-aware Entity Matching: A Compositional Approach
Entity matching (a.k.a. record linkage) plays a crucial role in integrating multiple data sources, and numerous matching solutions have been developed. However, the solutions have...
Warren Shen, Pedro DeRose, Long Vu, AnHai Doan, Ra...