Sciweavers

1615 search results - page 108 / 323
» What's new
Sort
View
STOC
2002
ACM
103views Algorithms» more  STOC 2002»
14 years 9 months ago
Approximate clustering via core-sets
In this paper, we show that for several clustering problems one can extract a small set of points, so that using those core-sets enable us to perform approximate clustering effici...
Mihai Badoiu, Sariel Har-Peled, Piotr Indyk
ICSE
2005
IEEE-ACM
14 years 9 months ago
Beyond computer science
Computer science is necessary but not sufficient to understand and overcome the problems we face in software engineering. We need to understand not only the properties of the soft...
James D. Herbsleb
ICSE
2007
IEEE-ACM
14 years 9 months ago
UML/Analyzer: A Tool for the Instant Consistency Checking of UML Models
Large design models contain tens of thousands of model elements. Designers easily get overwhelmed maintaining the consistency of such design models over time. Not only is it hard ...
Alexander Egyed
ESORICS
2002
Springer
14 years 8 months ago
Confidentiality Policies and Their Enforcement for Controlled Query Evaluation
Abstract. An important goal of security in information systems is confidentiality. A confidentiality policy specifies which users should be forbidden to acquire what kind of inform...
Joachim Biskup, Piero A. Bonatti
DCC
2005
IEEE
14 years 8 months ago
Two-Level Directory based Compression
In this paper we present a new dictionary-based preprocessing technique and its implementation called TWRT (Two-level Word Replacing Transformation). Our preprocessor uses several...
Przemyslaw Skibinski