Sciweavers

1421 search results - page 116 / 285
» Satisfying KBO Constraints
Sort
View
TDSC
2011
13 years 3 months ago
CASTLE: Continuously Anonymizing Data Streams
— Most of existing privacy preserving techniques, such as k-anonymity methods, are designed for static data sets. As such, they cannot be applied to streaming data which are cont...
Jianneng Cao, Barbara Carminati, Elena Ferrari, Ki...
TMC
2011
108views more  TMC 2011»
13 years 3 months ago
Spatial-Temporal Coverage Optimization in Wireless Sensor Networks
—Mission-driven sensor networks usually have special lifetime requirements. However, the density of the sensors may not be large enough to satisfy the coverage requirement while ...
Changlei Liu, Guohong Cao
IJACTAICIT
2010
151views more  IJACTAICIT 2010»
13 years 3 months ago
The Comparative Study of Software Optimal Release Time Based on Burr Distribution
It is great practical interest to decide when to stop testing a software system in development phase and transfer it to the user. This problem is called as the optimal software re...
Hee-Cheul Kim, Hyoung-Keun Park
IJBC
2010
69views more  IJBC 2010»
13 years 3 months ago
Initiation of HIV Therapy
In this paper, we numerically show that the dynamics of the HIV system is sensitive to both the initial condition and the system parameters. These phenomena imply that the system ...
Charlotte Yuk-Fan Ho, Bingo Wing-Kuen Ling
JAIR
2010
130views more  JAIR 2010»
13 years 3 months ago
Interactive Cost Configuration Over Decision Diagrams
In many AI domains such as product configuration, a user should interactively specify a solution that must satisfy a set of constraints. In such scenarios, offline compilation of ...
Henrik Reif Andersen, Tarik Hadzic, David Pisinger