Sciweavers

261 search results - page 46 / 53
» Iterative Development of Transformation Models by Using Clas...
Sort
View
OOPSLA
2007
Springer
14 years 1 months ago
Modular typestate checking of aliased objects
Objects often define usage protocols that clients must follow in order for these objects to work properly. Aliasing makes it notoriously difficult to check whether clients and i...
Kevin Bierhoff, Jonathan Aldrich
SAC
2010
ACM
13 years 7 months ago
Graph-based verification of static program constraints
Software artifacts usually have static program constraints and these constraints should be satisfied in each reuse. In addition to this, the developers are also required to satisf...
Selim Ciraci, Pim van den Broek, Mehmet Aksit
WWW
2008
ACM
14 years 8 months ago
Utility-driven load shedding for xml stream processing
Because of the high volume and unpredictable arrival rate, stream processing systems may not always be able to keep up with the input data streams-- resulting in buffer overflow a...
Mingzhu Wei, Elke A. Rundensteiner, Murali Mani
ISTA
2003
13 years 8 months ago
Reflective Learning in Large Companies - can it work?
: A growing number of universities and companies are now becoming focused on promoting learning that is not merely instrumental. These aspirations refer to deep learning, transform...
Mihaela-Monica Vladoiu, Beatrice Matenciuc-Antones...
EDBT
2010
ACM
132views Database» more  EDBT 2010»
13 years 10 months ago
Algorithm-safe privacy-preserving data publishing
This paper develops toolsets for eliminating algorithm-based disclosure from existing privacy-preserving data publishing algorithms. We first show that the space of algorithm-base...
Xin Jin, Nan Zhang 0004, Gautam Das