Sciweavers

2705 search results - page 507 / 541
» Privacy in Data Mining Using Formal Methods
Sort
View
ICSE
2012
IEEE-ACM
11 years 10 months ago
Synthesizing API usage examples
Abstract—Key program interfaces are sometimes documented with usage examples: concrete code snippets that characterize common use cases for a particular data type. While such doc...
Raymond P. L. Buse, Westley Weimer
ECBS
2005
IEEE
160views Hardware» more  ECBS 2005»
14 years 1 months ago
Traceability-Driven Model Refinement for Test Case Generation
Testing complex Computer-Based Systems is not only a demanding but a very critical task. Therefore the use of models for generating test data is an important goal. Tool support du...
Matthias Riebisch, Michael Hübner
ACL
2007
13 years 9 months ago
A Unified Tagging Approach to Text Normalization
This paper addresses the issue of text normalization, an important yet often overlooked problem in natural language processing. By text normalization, we mean converting ‘inform...
Conghui Zhu, Jie Tang, Hang Li, Hwee Tou Ng, Tieju...
IJCM
2002
73views more  IJCM 2002»
13 years 7 months ago
Space-Time Equations for Non-Unimodular Mappings
Abstract. The class of systems of uniform recurrence equations (UREs) is closed under unimodular transformations. As a result, every systolic array described by a unimodular mappin...
Jingling Xue, Patrick M. Lenders
VLDB
1994
ACM
149views Database» more  VLDB 1994»
13 years 11 months ago
Qualified Answers That Reflect User Needs and Preferences
This paper introduces a formalism to describe the needs and preferences of database users. Because of the precise formulation of these concepts, we have found an automatic and ver...
Terry Gaasterland, Jorge Lobo