Sciweavers

1207 search results - page 149 / 242
» Towards optimal k-anonymization
Sort
View
LCPC
2001
Springer
14 years 2 months ago
An Interface Model for Parallel Components
Component architectures promote cross-project code reuse by facilitating composition of large applications using off-the-shelf software components. Existing component architecture...
Milind A. Bhandarkar, Laxmikant V. Kalé
BIBE
2000
IEEE
14 years 2 months ago
Reconstructing Specimens using DIC Microscope Images
—Differential interference contrast (DIC) microscopy is a powerful visualization tool used to study live biological cells. Its use, however, has been limited to qualitative obser...
Farhana Kagalwala, Takeo Kanade
INFOCOM
2000
IEEE
14 years 2 months ago
Power Controlled Multiple Access (PCMA) in Wireless Communication Networks
—We address the issue of power-controlled shared channel access in future wireless networks supporting packetized data traffic, beyond the voice-oriented continuous traffic prima...
Nicholas Bambos, Sunil Kandukuri
DEXAW
1999
IEEE
129views Database» more  DEXAW 1999»
14 years 2 months ago
The Challenges of Requirements Engineering in Mobile Telephones Industry
Requirements engineering ranks as one of the most difficult and error-prone phases in the life cycle of devices such as mobile telephones. It is of critical importance because of ...
Alessandro Maccari
FM
1999
Springer
104views Formal Methods» more  FM 1999»
14 years 1 months ago
On Excusable and Inexcusable Failures
Abstract. The classical concepts of partial and total correctness identify all types of runtime errors and divergence. We argue that the associated notions of translation correctne...
Markus Müller-Olm, Andreas Wolf