Sciweavers

949 search results - page 32 / 190
» Theory of Constraints
Sort
View
ICDE
2008
IEEE
124views Database» more  ICDE 2008»
14 years 10 months ago
Privacy: Theory meets Practice on the Map
In this paper, we propose the first formal privacy analysis of a data anonymization process known as the synthetic data generation, a technique becoming popular in the statistics c...
Ashwin Machanavajjhala, Daniel Kifer, John M. Abow...
RTAS
2008
IEEE
14 years 2 months ago
Equivalence between Schedule Representations: Theory and Applications
Multiprocessor scheduling problems are hard because of the numerous constraints on valid schedules to take into account. This paper presents new schedule representations in order ...
Matthieu Lemerre, Vincent David, Christophe Aussag...
LPNMR
2005
Springer
14 years 2 months ago
Answer Sets for Propositional Theories
Equilibrium logic, introduced by David Pearce, extends the concept of an answer set from logic programs to arbitrary sets of formulas. Logic programs correspond to the special case...
Paolo Ferraris
VL
1999
IEEE
134views Visual Languages» more  VL 1999»
14 years 23 days ago
Ambiguity in Visual Language Theory and Its Role in Diagram Parsing
To take advantage of the ever-increasing volume of diagrams in electronic form, it is crucial that we have methods for parsing diagrams. Once a structured, content-based descripti...
Robert P. Futrelle
ICWS
2008
IEEE
13 years 10 months ago
A Theory of Role Composition
We study the access control integration problem for web services. Organizations frequently use many services, each with its own access control policies, that must interoperate whi...
Jeffrey Fischer, Rupak Majumdar