Sciweavers

368 search results - page 43 / 74
» The Information Lost in Erasures
Sort
View
SAC
2003
ACM
14 years 1 months ago
Representing the Applications and Compositions of Design Patterns in UML
Design patterns capture the distilled experience of expert designers. The compositions of design patterns may reuse design experience and solve a set of problems. Design patterns ...
Jing Dong
ISWC
2002
IEEE
14 years 1 months ago
Using Wearable Computers to Construct Semantic Representations of Physical Spaces
The representation of physical space has traditionally focused on keyphrases such as “Computer Science Building” or “Physics Department” that help us in describing and nav...
Fernando Diaz
ICDM
2007
IEEE
138views Data Mining» more  ICDM 2007»
14 years 15 days ago
Preserving Privacy through Data Generation
Many databases will not or can not be disclosed without strong guarantees that no sensitive information can be extracted. To address this concern several data perturbation techniq...
Jilles Vreeken, Matthijs van Leeuwen, Arno Siebes
AAAI
2008
13 years 11 months ago
Parallel Belief Revision
A recalcitrant problem in approaches to iterated belief revision is that, after first revising by a formula and then by a formula that is inconsistent with the first formula, all ...
James P. Delgrande, Yi Jin
IMF
2007
13 years 10 months ago
Towards Reliable Rootkit Detection in Live Response
: Within digital forensics investigations, the term Live Response refers to all activities that collect evidence on live systems. Though Live Response in general alters the state o...
Felix C. Freiling, Bastian Schwittay