Sciweavers

1128 search results - page 154 / 226
» Structuring anonymity metrics
Sort
View
SIGMOD
2009
ACM
157views Database» more  SIGMOD 2009»
14 years 9 months ago
Authenticated join processing in outsourced databases
Database outsourcing requires that a query server constructs a proof of result correctness, which can be verified by the client using the data owner's signature. Previous aut...
Yin Yang, Dimitris Papadias, Stavros Papadopoulos,...
ICASSP
2009
IEEE
14 years 3 months ago
Automatic musical meter detection
A method that automatically estimates the metrical structure of a piece of music is presented. The approach is based on the generation of a beat similarity matrix, which provides ...
Mikel Gainza
ICTA
2009
IEEE
14 years 3 months ago
Feasibility Analysis for SemiAutomatic Conversion of Text to Improve Readability
1 WCAG 2.0 (W3C Recommendation 11 Dec. 2008) recommendation includes a specific guideline regarding the readability of text contents. This paper presents an approach to adapt text ...
Susana Bautista, Pablo Gervás, R. Ignacio M...
ICSM
2008
IEEE
14 years 3 months ago
Software visualization with audio supported cognitive glyphs
There exist numerous software visualization techniques that aim to facilitate program comprehension. One of the main concerns in every such software visualization is to identify r...
Sandro Boccuzzo, Harald Gall
ICSM
2007
IEEE
14 years 3 months ago
Mining the Lexicon Used by Programmers during Sofware Evolution
Identifiers represent an important source of information for programmers understanding and maintaining a system. Self-documenting identifiers reduce the time and effort necessa...
Giuliano Antoniol, Yann-Gaël Guéh&eacu...