Sciweavers

261 search results - page 46 / 53
» Iterative Development of Transformation Models by Using Clas...
Sort
View
116
Voted
OOPSLA
2007
Springer
15 years 8 months ago
Modular typestate checking of aliased objects
Objects often define usage protocols that clients must follow in order for these objects to work properly. Aliasing makes it notoriously difficult to check whether clients and i...
Kevin Bierhoff, Jonathan Aldrich
SAC
2010
ACM
15 years 2 months ago
Graph-based verification of static program constraints
Software artifacts usually have static program constraints and these constraints should be satisfied in each reuse. In addition to this, the developers are also required to satisf...
Selim Ciraci, Pim van den Broek, Mehmet Aksit
124
Voted
WWW
2008
ACM
16 years 2 months ago
Utility-driven load shedding for xml stream processing
Because of the high volume and unpredictable arrival rate, stream processing systems may not always be able to keep up with the input data streams-- resulting in buffer overflow a...
Mingzhu Wei, Elke A. Rundensteiner, Murali Mani
ISTA
2003
15 years 3 months ago
Reflective Learning in Large Companies - can it work?
: A growing number of universities and companies are now becoming focused on promoting learning that is not merely instrumental. These aspirations refer to deep learning, transform...
Mihaela-Monica Vladoiu, Beatrice Matenciuc-Antones...
136
Voted
EDBT
2010
ACM
132views Database» more  EDBT 2010»
15 years 5 months ago
Algorithm-safe privacy-preserving data publishing
This paper develops toolsets for eliminating algorithm-based disclosure from existing privacy-preserving data publishing algorithms. We first show that the space of algorithm-base...
Xin Jin, Nan Zhang 0004, Gautam Das