BibSLEIGH
BibSLEIGH corpus
BibSLEIGH tags
BibSLEIGH bundles
BibSLEIGH people
CC-BY
Open Knowledge
XHTML 1.0 W3C Rec
CSS 2.1 W3C CanRec
email twitter
Used together with:
privaci (123)
data (64)
transform (45)
model (38)
system (31)

Stem preserv$ (all stems)

447 papers:

CASECASE-2015-HandokoL #order #performance #privacy
Efficient order sharing with privacy preservation via double auction with split delivery (SDH, HCL), pp. 69–74.
DACDAC-2015-SonghoriHSK #logic #nearest neighbour #privacy #synthesis #using
Compacting privacy-preserving k-nearest neighbor search using logic synthesis (EMS, SUH, ARS, FK), p. 6.
DATEDATE-2015-KonstantinouKM #encryption #functional #privacy #verification
Privacy-preserving functional IP verification utilizing fully homomorphic encryption (CK, AK, MM), pp. 333–338.
SIGMODSIGMOD-2015-MavroforakisCOK #composition #encryption #revisited
Modular Order-Preserving Encryption, Revisited (CM, NC, AO, GK, RC), pp. 763–777.
VLDBVLDB-2015-SeahBS #concept #image #named #social #summary
PRISM: Concept-preserving Summarization of Top-K Social Image Search Results (BSS, SSB, AS), pp. 1868–1879.
STOCSTOC-2015-DworkFHPRR #adaptation #data analysis #statistics
Preserving Statistical Validity in Adaptive Data Analysis (CD, VF, MH, TP, OR, ALR), pp. 117–126.
FMFM-2015-DiekmannHC #semantics #set
Semantics-Preserving Simplification of Real-World Firewall Rule Sets (CD, LH, GC), pp. 195–212.
CHICHI-2015-PlimmerHZKYJBD #interactive #tool support
New Interaction Tools for Preserving an Old Language (BP, LH, TZ, KK, AWY, GJ, RB, EYLD), pp. 3493–3502.
CHICHI-2015-RenaudM #privacy
Regulating Access to Adult Content (with Privacy Preservation) (KR, JM), pp. 4019–4028.
ICEISICEIS-v2-2015-SmirnovP #architecture #hybrid #network #peer-to-peer #privacy #recommendation
Privacy-preserving Hybrid Peer-to-Peer Recommendation System Architecture — Locality-Sensitive Hashing in Structured Overlay Network (AVS, AP), pp. 532–542.
ICMLICML-2015-AnBB #how #linear #network #question
How Can Deep Rectifier Networks Achieve Linear Separability and Preserve Distances? (SA, FB, MB), pp. 514–523.
KDDKDD-2015-KarakasidisKV #privacy #scalability
Scalable Blocking for Privacy Preserving Record Linkage (AK, GK, VSV), pp. 527–536.
SIGIRSIGIR-2015-YangS #information retrieval #privacy #security
Privacy-Preserving IR 2015: When Information Retrieval Meets Privacy and Security (HY, IS), pp. 1157–1158.
MODELSMoDELS-J-2011-Steimann15 #refactoring
From well-formedness to meaning preservation: model refactoring for almost free (FS), pp. 307–320.
MODELSMoDELS-J-2011-Steimann15 #refactoring
From well-formedness to meaning preservation: model refactoring for almost free (FS), pp. 307–320.
AMTAMT-2015-DyckGLSG #automation #behaviour #model transformation #towards #verification
Towards the Automatic Verification of Behavior Preservation at the Transformation Level for Operational Model Transformations (JD, HG, LL, SS, SG), pp. 36–45.
SACSAC-2015-HanHQY #clustering
Locality-preserving L1-graph and its application in clustering (SH, HH, HQ, DY), pp. 813–818.
ICSEICSE-v1-2015-PetersML #fault #named #predict #privacy
LACE2: Better Privacy-Preserving Data Sharing for Cross Project Defect Prediction (FP, TM, LL), pp. 801–811.
LICSLICS-2015-EndrullisGH #encoding
Regularity Preserving but Not Reflecting Encodings (JE, CG, DH), pp. 535–546.
DocEngDocEng-2014-DavisonMM #named #privacy #semantics #similarity
P-GTM: privacy-preserving google tri-gram method for semantic text similarity (OD, AM, EEM), pp. 81–84.
SIGMODSIGMOD-2014-Dev14a #community #detection #graph #precise #privacy #social
Privacy preserving social graphs for high precision community detection (HD), pp. 1615–1616.
VLDBVLDB-2014-LiXZJ #named #privacy
DPSynthesizer: Differentially Private Data Synthesizer for Privacy Preserving Data Sharing (HL, LX, LZ, XJ), pp. 1677–1680.
PEPMPEPM-2014-LeatherJLS #semantics
Type-changing rewriting and semantics-preserving transformation (SL, JJ, AL, BS), pp. 109–120.
STOCSTOC-2014-DworkTT0 #analysis #bound #component #privacy
Analyze gauss: optimal bounds for privacy-preserving principal component analysis (CD, KT, AT, LZ), pp. 11–20.
CIAACIAA-2014-Maletti #bottom-up #multi #power of #transducer
The Power of Regularity-Preserving Multi Bottom-up Tree Transducers (AM), pp. 278–289.
ICALPICALP-v1-2014-BasavarajuFGMRS #algorithm
Parameterized Algorithms to Preserve Connectivity (MB, FVF, PAG, PM, MSR, SS), pp. 800–811.
CHICHI-2014-BalestriniBMZR #case study #community #comprehension
Understanding sustained community engagement: a case study in heritage preservation in rural argentina (MB, JB, PM, AZ, YR), pp. 2675–2684.
CHICHI-2014-PanS #multi
A gaze-preserving situated multiview telepresence system (YP, AS), pp. 2173–2176.
ICEISICEIS-v1-2014-FreireCSS #process #query #semantics
Preserving the Original Query Semantics in Routing Processes (CF, NC, DS, ACS), pp. 70–80.
CIKMCIKM-2014-DongLW #as a service #named #privacy
PraDa: Privacy-preserving Data-Deduplication-as-a-Service (BD, RL, WHW), pp. 1559–1568.
CIKMCIKM-2014-VatsalanC #database #multi #privacy #scalability
Scalable Privacy-Preserving Record Linkage for Multiple Databases (DV, PC), pp. 1795–1798.
CIKMCIKM-2014-WuZYJL #distributed #named #rdf #semantics
SemStore: A Semantic-Preserving Distributed RDF Triple Store (BW, YZ, PY, HJ, LL), pp. 509–518.
ICMLICML-c2-2014-PachecoZBS
Preserving Modes and Messages via Diverse Particle Selection (JP, SZ, MJB, EBS), pp. 1152–1160.
ICPRICPR-2014-DanckaersHLLVDS
Correspondence Preserving Elastic Surface Registration with Shape Model Prior (FD, TH, DL, AL, SV, SVD, JS), pp. 2143–2148.
ICPRICPR-2014-FranchiA #adaptation
Spatially-Variant Area Openings for Reference-Driven Adaptive Contour Preserving Filtering (GF, JA), pp. 1043–1048.
ICPRICPR-2014-HuangZLW #distance #feature model
A Method of Discriminative Information Preservation and In-Dimension Distance Minimization Method for Feature Selection (SH, JZ, XL, LW), pp. 1615–1620.
ICPRICPR-2014-RehnS #locality #visual notation
Nonlinear Supervised Locality Preserving Projections for Visual Pattern Discrimination (EMR, HS), pp. 1568–1573.
ICPRICPR-2014-YanJY #feature model #representation
Sparse Representation Preserving for Unsupervised Feature Selection (HY, ZJ, JY), pp. 1574–1578.
ICPRICPR-2014-ZhangZZL #image
Surface Interpolation to Image with Edge Preserving (LZ, CZ, YZ, XL), pp. 1055–1060.
KDDKDD-2014-AcsC #case study #privacy
A case study: privacy preserving release of spatio-temporal density in paris (, CC), pp. 1679–1688.
KEODKEOD-2014-BakhshandehKAYC #ontology
A Digital Preservation-Legal Ontology (MB, BKR, GA, SAY, AC, JLB), pp. 215–222.
SIGIRSIGIR-2014-SeahBS #concept #image #named #social #summary
PRISM: concept-preserving social image search results summarization (BSS, SSB, AS), pp. 737–746.
SIGIRSIGIR-2014-SiY #information retrieval #privacy #security
Privacy-preserving IR: when information retrieval meets privacy and security (LS, HY), p. 1295.
SIGIRSIGIR-2014-ZhangWRS #performance #recommendation
Preference preserving hashing for efficient recommendation (ZZ, QW, LR, LS), pp. 183–192.
PPDPPPDP-2014-KranzS #compilation #domain-specific language #functional #integration #legacy #performance
Structure-Preserving Compilation: Efficient Integration of Functional DSLs into Legacy Systems (JK, AS), pp. 187–198.
SACSAC-2014-A #authentication #health #mobile #network #privacy #research #student
Student research abstract: a privacy-preserving profile matching based authentication system for mobile health networks (DHA), pp. 196–197.
SACSAC-2014-BaeLKWP #network #privacy #social
Analyzing network privacy preserving methods: a perspective of social network characteristics (DHB, JML, SWK, YW, YP), pp. 331–332.
SACSAC-2014-BasuCKMVG0M #feedback #privacy #social
Privacy preserving trusted social feedback (AB, JCC, SK, SM, JV, GG, JZ, YM), pp. 1706–1711.
SACSAC-2014-PetrlicLS #privacy
Privacy-preserving reputation management (RP, SL, CS), pp. 1712–1718.
SACSAC-2014-PetroccoCPE #performance
Hiding user content interest while preserving P2P performance (RP, MC, JAP, DHJE), pp. 501–508.
FSEFSE-2014-MirakhorliFGWC #architecture #detection #monitoring #named
Archie: a tool for detecting, monitoring, and preserving architecturally significant code (MM, AF, AG, MW, JCH), pp. 739–742.
LICSLICS-CSL-2014-BenediktCB #effectiveness #logic
Effective interpolation and preservation in guarded logics (MB, BtC, MVB), p. 10.
LICSLICS-CSL-2014-HarwathHS #bound #composition #theorem
Preservation and decomposition theorems for bounded degree structures (FH, LH, NS), p. 10.
LICSLICS-CSL-2014-LiangFS #composition #concurrent #refinement #source code #verification
Compositional verification of termination-preserving refinement of concurrent programs (HL, XF, ZS), p. 10.
ASEASE-2013-KehrerKT #version control
Consistency-preserving edit scripts in model versioning (TK, UK, GT), pp. 191–201.
ASEASE-2013-Mirakhorli #architecture #implementation #visualisation
Preventing erosion of architectural tactics through their strategic implementation, preservation, and visualization (MM), pp. 762–765.
DATEDATE-2013-YuehCM #architecture #quality
Perceptual quality preserving SRAM architecture for color motion pictures (WY, MC, SM), pp. 103–108.
DocEngDocEng-2013-HoverM
Interchanging and preserving presentation recordings (KMH, MM), pp. 277–280.
ICDARICDAR-2013-ZaraiLDW
Integrating Copies Obtained from Old and New Preservation Efforts (YZ, TL, ND, LW), pp. 47–51.
SIGMODSIGMOD-2013-BonomiXL #integration #named #privacy
LinkIT: privacy preserving record linkage and integration via transformations (LB, LX, JJL), pp. 1029–1032.
SIGMODSIGMOD-2013-LinK #estimation #privacy #statistics
Information preservation in statistical privacy and bayesian estimation of unattributed histograms (BRL, DK), pp. 677–688.
VLDBVLDB-2013-LongWGJ
Direction-Preserving Trajectory Simplification (CL, RCWW, HVJ), pp. 949–960.
VLDBVLDB-2013-ZhangWYMC #integration #lightweight #peer-to-peer #privacy
Lightweight Privacy-Preserving Peer-to-Peer Data Integration (YZ, WKW, SMY, NM, DWC), pp. 157–168.
TACASTACAS-2013-ChristHN #proving
Proof Tree Preserving Interpolation (JC, JH, AN), pp. 124–138.
TACASTACAS-2013-WijsE #performance
Efficient Property Preservation Checking of Model Refinements (AW, LE), pp. 565–579.
DLTDLT-J-2012-LehtinenO13 #context-free grammar #morphism
Homomorphisms Preserving Deterministic Context-Free Languages (TL, AO), pp. 1049–1066.
DLTDLT-2013-Shur #anti #finite #order
Languages with a Finite Antidictionary: Growth-Preserving Transformations and Available Orders of Growth (AMS), pp. 445–457.
ICALPICALP-v1-2013-BravermanRWY
Direct Product via Round-Preserving Compression (MB, AR, OW, AY), pp. 232–243.
CHICHI-2013-CafaroPLRR #exclamation #interactive
I see you there!: developing identity-preserving embodied interaction for museum exhibits (FC, AP, LL, JR, JR), pp. 1911–1920.
CHICHI-2013-FlatlaRGG13a #automation #named
SPRWeb: preserving subjective responses to website colour schemes through automatic recolouring (DRF, KR, CG, KZG), pp. 2069–2078.
CAiSECAiSE-2013-BarhamgiBOCCMT #execution #privacy
Secure and Privacy-Preserving Execution Model for Data Services (MB, DB, SO, NCB, FC, MM, HT), pp. 35–50.
CIKMCIKM-2013-TianCZ #approach #database #hybrid #mobile #privacy #query
A hybrid approach for privacy-preserving processing of knn queries in mobile database systems (ST, YC, QZ), pp. 1161–1164.
ICMLICML-c3-2013-HwangGS #categorisation #semantics #visual notation
Analogy-preserving Semantic Embedding for Visual Object Categorization (SJH, KG, FS), pp. 639–647.
ICMLICML-c3-2013-KimS #approximate #modelling #topic
Manifold Preserving Hierarchical Topic Models for Quantization and Approximation (MK, PS), pp. 1373–1381.
KDDKDD-2013-JohnsonS #data analysis #privacy
Privacy-preserving data exploration in genome-wide association studies (AJ, VS), pp. 1079–1087.
KDDKDD-2013-WuNTWXX #framework #privacy
A privacy preserving framework for managing vehicle data in road pricing systems (HW, WSN, KLT, WW, SX, MX), pp. 1427–1435.
KDIRKDIR-KMIS-2013-BachmannNMBAC #information management #process #safety
Preservation and Redeployment of Sensor Acquisition Processes from a Dam Safety Information System (AB, MAN, HM, JB, GA, AC), pp. 490–495.
SIGIRSIGIR-2013-MoranLO
Neighbourhood preserving quantisation for LSH (SM, VL, MO), pp. 1009–1012.
QAPLQAPL-2013-GazeauMP #difference #privacy #semantics
Preserving differential privacy under finite-precision semantics (IG, DM, CP), pp. 1–18.
SACSAC-PL-J-2010-RodriguesNPM13 #semantics
Preserving the original MPI semantics in a virtualized processor environment (ERR, POAN, JP, CLM), pp. 412–421.
ASPLOSASPLOS-2013-WangW #hardware #named #optimisation #performance
TSO_ATOMICITY: efficient hardware primitive for TSO-preserving region optimizations (CW, YW), pp. 509–520.
CAVCAV-2013-CernyHRRT #concurrent #performance #semantics #synthesis
Efficient Synthesis for Concurrency by Semantics-Preserving Transformations (PC, TAH, AR, LR, TT), pp. 951–967.
ASEASE-2012-Yamamoto #refinement
Property-preserving program refinement (YY), pp. 398–401.
DACDAC-2012-ShojaeiDR #integer #programming
Confidentiality preserving integer programming for global routing (HS, AD, PR), pp. 709–716.
SIGMODSIGMOD-2012-FanLWW #graph #query
Query preserving graph compression (WF, JL, XW, YW), pp. 157–168.
SIGMODSIGMOD-2012-MohanTSSC #data analysis #named #privacy
GUPT: privacy preserving data analysis made easy (PM, AT, ES, DS, DEC), pp. 349–360.
VLDBVLDB-2012-AgrawalAW #in the cloud #perspective #privacy
Secure and Privacy-Preserving Data Services in the Cloud: A Data Centric View (DA, AEA, SW), pp. 2028–2029.
VLDBVLDB-2012-TerrovitisLMS #privacy
Privacy Preservation by Disassociation (MT, JL, NM, SS), pp. 944–955.
CSMRCSMR-2012-BarateiroDNS #challenge #lifecycle
Digital Preservation Challenges on Software Life Cycle (JB, DD, MAN, SS), pp. 487–490.
ICSMEICSM-2012-OuniKSH #refactoring #search-based #semantics #towards
Search-based refactoring: Towards semantics preservation (AO, MK, HAS, MSH), pp. 347–356.
DLTDLT-2012-LehtinenO #context-free grammar #morphism
Homomorphisms Preserving Deterministic Context-Free Languages (TL, AO), pp. 154–165.
ICALPICALP-v1-2012-FellowsKRS #approximate
Parameterized Approximation via Fidelity Preserving Transformations (MRF, AK, FAR, HS), pp. 351–362.
ICALPICALP-v1-2012-KrauthgamerZ #using
Preserving Terminal Distances Using Minors (RK, TZ), pp. 594–605.
IFMIFM-2012-DiaconescuLPSS #interactive
Refinement-Preserving Translation from Event-B to Register-Voice Interactive Systems (DD, IL, LP, KS, GS), pp. 221–236.
ICGTICGT-2012-AnjorinST #graph grammar
Construction of Integrity Preserving Triple Graph Grammars (AA, AS, GT), pp. 356–370.
ICGTICGT-2012-GieseL #automation #behaviour #invariant #model transformation #towards #verification
Towards Automatic Verification of Behavior Preservation for Model Transformation via Invariant Checking (HG, LL), pp. 249–263.
ICEISICEIS-J-2012-BanosBM #challenge #paradigm
Blog Preservation: Current Challenges and a New Paradigm (VB, NB, YM), pp. 29–51.
ICEISICEIS-v1-2012-Manolopoulos #roadmap
Trends in Blog Preservation (VB, NB, YM).
CIKMCIKM-2012-BonomiXCF #privacy
Frequent grams based embedding for privacy preserving record linkage (LB, LX, RC, BCMF), pp. 1597–1601.
CIKMCIKM-2012-ChenLTH
Information preservation in static index pruning (RCC, CJL, CMT, JH), pp. 2487–2490.
CIKMCIKM-2012-VlachosWS #clustering
Right-protected data publishing with hierarchical clustering preservation (MV, AW, JS), pp. 654–663.
CIKMCIKM-2012-YaoC #locality #matrix
Accelerating locality preserving nonnegative matrix factorization (GY, DC), pp. 2271–2274.
ICMLICML-2012-ShiSHH #question #random
Is margin preserved after random projection? (QS, CS, RH, AvdH), p. 86.
ICPRICPR-2012-BaoSYA #framework
An edge-preserving filtering framework for visibility restoration (LB, YS, QY, NA), pp. 384–387.
ICPRICPR-2012-CarliniF
A Semi-Lagrangian scheme for area preserving flows (EC, RF), pp. 2029–2033.
ICPRICPR-2012-DasR #documentation #image #novel #quality
A novel scheme of orientation and scale mapped RDC (OS-RDC) to improve compression in document images ensuring quality preservation (AD, RR), pp. 641–644.
GPCEGPCE-2012-AxelsenK #java #performance #semantics #text-to-text
Package templates: a definition by semantics-preserving source-to-source transformations to efficient Java code (EWA, SK), pp. 50–59.
SACSAC-2012-BasuVDK #case study #collaboration #performance #privacy
Feasibility of a privacy preserving collaborative filtering scheme on the Google App Engine: a performance case study (AB, JV, TD, HK), pp. 447–452.
LDTALDTA-2012-JongeV #refactoring
A language generic solution for name binding preservation in refactorings (MdJ, EV), p. 2.
ICLPICLP-2012-NovelliVPD #architecture #named
LOG-IDEAH: ASP for Architectonic Asset Preservation (VN, MDV, JAP, DD), pp. 393–403.
ICSTICST-2012-TranP #framework #graph transformation #towards #verification
Towards a Rule-Level Verification Framework for Property-Preserving Graph Transformations (HNT, CP), pp. 946–953.
LICSLICS-2012-ChenM #algebra #category theory #constraints #quantifier #theorem
An Algebraic Preservation Theorem for Aleph-Zero Categorical Quantified Constraint Satisfaction (HC, MM), pp. 215–224.
DATEDATE-2011-NejadMG #quality
An FPGA bridge preserving traffic quality of service for on-chip network-based systems (ABN, MEM, KG), pp. 425–430.
ICDARICDAR-2011-DuL #identification #privacy
Preservative License Plate De-identification for Privacy Protection (LD, HL), pp. 468–472.
ICDARICDAR-2011-YamazoeEYT #approach #finite #recognition #transducer
Hypothesis Preservation Approach to Scene Text Recognition with Weighted Finite-State Transducer (TY, ME, TY, KT), pp. 359–363.
PODSPODS-2011-AntonopoulosMN #complexity #xml
The complexity of text-preserving XML transformations (TA, WM, FN), pp. 247–258.
PODSPODS-2011-HeBWN #complexity #on the #privacy
On the complexity of privacy-preserving complex event processing (YH, SB, DW, JFN), pp. 165–174.
VLDBVLDB-2011-SrinivasanB #named #realtime
Citrusleaf: A Real-Time NoSQL DB which Preserves ACID (VS, BB), pp. 1340–1350.
ICSMEICSM-2011-MihaliczaPG #c++ #profiling
Type-preserving heap profiler for C++ (JM, ZP, AG), pp. 457–466.
PLDIPLDI-2011-BudiLJL #behaviour #debugging #named
kb-anonymity: a model for anonymized behaviour-preserving test and debugging data (AB, DL, LJ, L), pp. 447–457.
PLDIPLDI-2011-MarinoSMMN #compilation
A case for an SC-preserving compiler (DM, AS, TDM, MM, SN), pp. 199–210.
STOCSTOC-2011-Smith #convergence #estimation #privacy #statistics
Privacy-preserving statistical estimation with optimal convergence rates (AS), pp. 813–822.
AFLAFL-2011-Blanchet-SadriNT #on the #word
On Operations Preserving Primitivity of Partial Words with One Hole (FBS, SN, AT), pp. 93–107.
ICALPICALP-v2-2011-GoodrichM #outsourcing #privacy #ram #simulation
Privacy-Preserving Access of Outsourced Data via Oblivious RAM Simulation (MTG, MM), pp. 576–587.
ICALPICALP-v2-2011-GotsmanY #abstraction
Liveness-Preserving Atomicity Abstraction (AG, HY), pp. 453–465.
ICFPICFP-2011-AhmedB #continuation #multi #semantics
An equivalence-preserving CPS translation via multi-language semantics (AA, MB), pp. 431–444.
HCIHIMI-v1-2011-NasozBPR #metadata
A User-Centric Metadata Creation Tool for Preserving the Nation’s Ecological Data (FN, RCB, CJP, DJR), pp. 122–131.
HCIHIMI-v2-2011-UesakaIY #visual notation
A Digital Archive System for Preserving Audio and Visual Space (MU, YI, TY), pp. 103–110.
CIKMCIKM-2011-BanerjeeC #distributed #feature model #privacy #using
Privacy preserving feature selection for distributed data using virtual dimension (MB, SC), pp. 2281–2284.
CIKMCIKM-2011-GevaV #documentation #named
TOPSIG: topology preserving document signatures (SG, CMDV), pp. 333–338.
CIKMCIKM-2011-HsuC #analysis #component #independence #privacy
Privacy preservation by independent component analysis and variance control (CMH, MSC), pp. 925–930.
CIKMCIKM-2011-LiLSG #community #named #online #performance #privacy #recommendation #social
YANA: an efficient privacy-preserving recommender system for online social communities (DL, QL, LS, NG), pp. 2269–2272.
CIKMCIKM-2011-TangWLMP #network #privacy
Privacy preserving indexing for eHealth information networks (YT, TW, LL, SM, BP), pp. 905–914.
ICMLICML-2011-BuffoniCGU #learning #standard
Learning Scoring Functions with Order-Preserving Losses and Standardized Supervision (DB, CC, PG, NU), pp. 825–832.
ICMLICML-2011-QuadriantoL #learning #multi
Learning Multi-View Neighborhood Preserving Projections (NQ, CHL), pp. 425–432.
ICMLICML-2011-ShiehHA
Tree preserving embedding (AS, TH, EA), pp. 753–760.
ICMLICML-2011-VattaniCG #personalisation #rank
Preserving Personalized Pagerank in Subgraphs (AV, DC, MG), pp. 793–800.
KDDKDD-2011-TaiYYC #network #privacy #social
Privacy-preserving social network publication against friendship attacks (CHT, PSY, DNY, MSC), pp. 1262–1270.
KEODKEOD-2011-AkamaN
Meaning-preserving Skolemization (KA, EN), pp. 322–327.
KMISKMIS-2011-SaharkhizS #multi #network #privacy #social
A Method for Preserving Privacy in Published Multi-relational Social Networks (AS, HRS), pp. 341–346.
ICMTICMT-2011-BeckerLDBG #development #refactoring #rule-based
Iterative Development of Consistency-Preserving Rule-Based Refactorings (BB, LL, JD, SB, HG), pp. 123–137.
SACSAC-2011-AhluwaliaGCY #mining #privacy
Target-based privacy preserving association rule mining (MA, AG, ZC, YY), pp. 962–967.
SACSAC-2011-RayNDF #interactive #privacy #verification
Verification of data pattern for interactive privacy preservation model (SR, MFN, SD, BCMF), pp. 1716–1723.
SLESLE-2011-JongeV #algorithm #layout #refactoring
An Algorithm for Layout Preservation in Refactoring Transformations (MdJ, EV), pp. 40–59.
SPLCSPLC-2011-HutchessonM #effectiveness #product line #towards
Towards Cost-Effective High-Assurance Software Product Lines: The Need for Property-Preserving Transformations (SH, JAM), pp. 55–64.
RTARTA-2011-AotoT #confluence #proving #term rewriting
A Reduction-Preserving Completion for Proving Confluence of Non-Terminating Term Rewriting Systems (TA, YT), pp. 91–106.
RTARTA-2011-DurandS #bound #linear
Left-linear Bounded TRSs are Inverse Recognizability Preserving (ID, MS), pp. 361–376.
RTARTA-2011-StumpKO #confluence #problem
Type Preservation as a Confluence Problem (AS, GK, REHO), pp. 345–360.
DATEDATE-2010-El-MoselhyD #order #reduction #statistics #using
Variation-aware interconnect extraction using statistical moment preserving model order reduction (TAEM, LD), pp. 453–458.
HTHT-2010-CartledgeN #analysis #graph
Analysis of graphs for digital preservation suitability (CLC, MLN), pp. 109–118.
SIGMODSIGMOD-2010-ChengFL #morphism #named #network #privacy
K-isomorphism: privacy preserving network publication against structural attacks (JC, AWCF, JL), pp. 459–470.
SIGMODSIGMOD-2010-ElmeleegyOEA #integration #peer-to-peer #privacy
Preserving privacy and fairness in peer-to-peer data integration (HE, MO, AKE, AMA), pp. 759–770.
SIGMODSIGMOD-2010-NabeelSZB #named #privacy
Mask: a system for privacy-preserving policy-based access to published content (MN, NS, JZ, EB), pp. 1239–1242.
SIGMODSIGMOD-2010-WongMC #privacy
Non-homogeneous generalization in privacy preserving data publishing (WKW, NM, DWLC), pp. 747–758.
FASEFASE-2010-JacksonSBK #model transformation #reuse
Reusing Model Transformations While Preserving Properties (EKJ, WS, DB, GK), pp. 44–58.
PLDIPLDI-2010-ChenCS #compilation #security #verification
Type-preserving compilation of end-to-end verification of security enforcement (JC, RC, NS), pp. 412–423.
IFMIFM-2010-HulsbuschKRSSW #comparison #model transformation #semantics
Showing Full Semantics Preservation in Model Transformation — A Comparison of Techniques (MH, BK, AR, MS, CS, HW), pp. 183–198.
GT-VMTGT-VMT-2010-BottoniFP #constraints #model transformation
Preserving constraints in horizontal model transformations (PB, AF, FPP).
ICGTICGT-2010-Khomenko #behaviour
A New Type of Behaviour-Preserving Transition Insertions in Unfolding Prefixes (VK), pp. 75–90.
CHICHI-2010-WilliamsonRSMJB #privacy #social
Social gravity: a virtual elastic tether for casual, privacy-preserving pedestrian rendezvous (JW, SR, CDS, RMS, MJ, SAB), pp. 1485–1494.
AdaEuropeAdaEurope-2010-MezzettiPV #ada
Preservation of Timing Properties with the Ada Ravenscar Profile (EM, MP, TV), pp. 153–166.
CIKMCIKM-2010-FreniVMBJ #network #privacy
Preserving location and absence privacy in geo-social networks (DF, CRV, SM, CB, CSJ), pp. 309–318.
CIKMCIKM-2010-ShangCSCH #towards
(k, P)-anonymity: towards pattern-preserving anonymity of time-series data (XS, KC, LS, GC, TH), pp. 1333–1336.
ICPRICPR-2010-BouboulisTS #image #kernel
Edge Preserving Image Denoising in Reproducing Kernel Hilbert Spaces (PB, ST, KS), pp. 2660–2663.
ICPRICPR-2010-Giachetti #image
Irradiance Preserving Image Interpolation (AG), pp. 2218–2221.
ICPRICPR-2010-GrazziniS #image
Iterative Ramp Sharpening for Structure/Signature-Preserving Simplification of Images (JG, PS), pp. 4585–4588.
ICPRICPR-2010-HuiWX #linear
Globally-Preserving Based Locally Linear Embedding (KH, CW, BX), pp. 531–534.
ICPRICPR-2010-TakahashiK #approximate #classification
Margin Preserved Approximate Convex Hulls for Classification (TT, MK), pp. 4052–4055.
ICPRICPR-2010-YangGG #analysis #locality #recognition
Extended Locality Preserving Discriminant Analysis for Face Recognition (LY, WG, XG), pp. 539–542.
ICPRICPR-2010-ZhanY #clustering
Cluster Preserving Embedding (YZ, JY), pp. 621–624.
KDDKDD-2010-FangNF
Discovering significant relaxed order-preserving submatrices (QF, WN, JF), pp. 433–442.
KDDKDD-2010-JinZZD #privacy
Versatile publishing for privacy preservation (XJ, MZ, NZ, GD), pp. 353–362.
KDDKDD-2010-LinC #outsourcing #privacy #random
Privacy-preserving outsourcing support vector machines with random transformation (KPL, MSC), pp. 363–372.
KDDKDD-2010-YangNSS #data mining #mining #privacy
Collusion-resistant privacy-preserving data mining (BY, HN, IS, JS), pp. 483–492.
KEODKEOD-2010-Brunsmann #collaboration #design #ontology #semantics #social
The Design of a Social Semantic Search Engine — Preserving Archived Collaborative Engineering Knowledge with Ontology Matching (JB), pp. 200–205.
KMISKMIS-2010-KadhemAK #database #encryption #order #performance #relational
A Secure and Efficient Order Preserving Encryption Scheme for Relational Databases (HK, TA, HK), pp. 25–35.
RecSysRecSys-2010-BaglioniBBCFVP #lightweight #mobile #privacy #recommendation
A lightweight privacy preserving SMS-based recommendation system for mobile users (EB, LB, LB, UMC, LF, AV, GP), pp. 191–198.
PPDPPPDP-2010-Martinez #concurrent #constraints #linear #programming #semantics
Semantics-preserving translations between linear concurrent constraint programming and constraint handling rules (TM), pp. 57–66.
SACSAC-2010-ChakrabartiCGM #analysis #linear #privacy
Privacy preserving linear discriminant analysis from perturbed data (SC, ZC, AG, SM), pp. 610–615.
SACSAC-2010-CuzzocreaB #distributed #framework #multi #privacy #xml
A secure multiparty computation privacy preserving OLAP framework over distributed XML data (AC, EB), pp. 1666–1673.
SACSAC-2010-DAngeloVZ #privacy #web
Content cloaking: preserving privacy with Google Docs and other web applications (GD, FV, SZ), pp. 826–830.
ICSEICSE-2010-SteimannT #behaviour #constraints #generative
From behaviour preservation to behaviour modification: constraint-based mutant generation (FS, AT), pp. 425–434.
CSLCSL-2010-SternagelT #dependence #proving #termination
Signature Extensions Preserve Termination — An Alternative Proof via Dependency Pairs (CS, RT), pp. 514–528.
DATEDATE-2009-BaumgartnerM #liveness #scalability
Scalable liveness checking via property-preserving transformations (JB, HM), pp. 1680–1685.
SIGMODSIGMOD-2009-BinnigHF #in memory #memory management #string
Dictionary-based order-preserving string compression for main memory column stores (CB, SH, FF), pp. 283–296.
SIGMODSIGMOD-2009-DasguptaZDC #database #how #privacy #question #why
Privacy preservation of aggregates in hidden databases: why and how? (AD, NZ, GD, SC), pp. 153–164.
SIGMODSIGMOD-2009-McSherry #data analysis #framework #privacy #query
Privacy integrated queries: an extensible platform for privacy-preserving data analysis (FM), pp. 19–30.
VLDBVLDB-2009-ZouCO09a #framework #morphism #named #network #privacy
K-Automorphism: A General Framework For Privacy Preserving Network Publication (LZ, LC, MTÖ), pp. 946–957.
ICALPICALP-v1-2009-ChekuriK #graph #reduction
A Graph Reduction Step Preserving Element-Connectivity and Applications (CC, NK), pp. 254–265.
LATALATA-2009-PardubskaPO #automaton #communication #correctness #on the #parallel
On Parallel Communicating Grammar Systems and Correctness Preserving Restarting Automata (DP, MP, FO), pp. 660–671.
FMFM-2009-Eshuis #petri net
Translating Safe Petri Nets to Statecharts in a Structure-Preserving Way (RE), pp. 239–255.
GT-VMTGT-VMT-2009-MazanekM #diagrams #editing #generative
Generating Correctness-Preserving Editing Operations for Diagram Editors (SM, MM), pp. 38–49.
CHICHI-2009-OdomPSB #comprehension #design #interactive #why
Understanding why we preserve some things and discard others in the context of interaction design (WO, JP, ES, EB), pp. 1053–1062.
ICEISICEIS-ISAS-2009-OhmoriK #approach #development #enterprise #invariant
Enterprise System Development with Invariant Preserving — A Mathematical Approach by the Homotopy Lifting and Extension Properties (KO, TLK), pp. 116–123.
CIKMCIKM-2009-ZhuCZWWC #algorithm #ranking
A general magnitude-preserving boosting algorithm for search ranking (CZ, WC, ZAZ, GW, DW, ZC), pp. 817–826.
ICMLICML-2009-ShawJ
Structure preserving embedding (BS, TJ), pp. 937–944.
KDIRKDIR-2009-Zhan #collaboration #data mining #mining #privacy
Privacy-Preserving Collaborative Data Mining (JZ), p. 15.
KEODKEOD-2009-Zhan #collaboration #data mining #mining #privacy
Privacy-Preserving Collaborative Data Mining (JZ), p. 15.
KMISKMIS-2009-Zhan #collaboration #data mining #mining #privacy
Privacy-Preserving Collaborative Data Mining (JZ), p. 15.
MLDMMLDM-2009-ZhuFF #classification #privacy
Preserving Privacy in Time Series Data Classification by Discretization (YZ, YF, HF), pp. 53–67.
RecSysRecSys-2009-ShokriPTH #collaboration #distributed #privacy
Preserving privacy in collaborative filtering through distributed aggregation of offline profiles (RS, PP, GT, JPH), pp. 157–164.
SEKESEKE-2009-ChaoS #clustering #data type #privacy
Privacy-preserving Clustering of Data Streams (CMC, CCS), pp. 530–535.
SACSAC-2009-BeckerR #evaluation #modelling #off the shelf #requirements
Requirements modelling and evaluation for digital preservation: a COTS selection method based on controlled experimentation (CB, AR), pp. 401–402.
SACSAC-2009-PereiraTLP #network
Preservation of ordering in a network of brokers (CMMP, CACT, DCL, MdGCP), pp. 88–89.
SACSAC-2009-Vaidya #linear #privacy #programming
Privacy-preserving linear programming (JV), pp. 2002–2007.
SACSAC-2009-XuLQ #predict #privacy
Privacy preserving churn prediction (SX, SL, MQ), pp. 1610–1614.
ICSEICSE-2009-CasoBGU #abstraction #contract #finite #using #validation
Validation of contracts using enabledness preserving finite state abstractions (GdC, VAB, DG, SU), pp. 452–462.
DATEDATE-2008-VillenaS #algorithm #named #order #reduction #scalability
SPARE — a Scalable algorithm for passive, structure preserving, Parameter-Aware model order REduction (JFV, LMS), pp. 586–591.
SIGMODSIGMOD-2008-ChowMH #monitoring #named #network #privacy
Tinycasper: a privacy-preserving aggregate location monitoring system in wireless sensor networks (CYC, MFM, TH), pp. 1307–1310.
SIGMODSIGMOD-2008-LiTX #privacy #proximity
Preservation of proximity privacy in publishing numerical sensitive data (JL, YT, XX), pp. 473–486.
SIGMODSIGMOD-2008-XiaoT #analysis #privacy #statistics
Dynamic anonymization: accurate statistical analysis with privacy preservation (XX, YT), pp. 107–120.
VLDBVLDB-2008-BuFWCL #composition #privacy
Privacy preserving serial data publishing by role composition (YB, AWCF, RCWW, LC, JL), pp. 845–856.
VLDBVLDB-2008-TerrovitisMK #privacy
Privacy-preserving anonymization of set-valued data (MT, NM, PK), pp. 115–125.
VLDBVLDB-2008-ZerrN #distributed #documentation #framework #privacy
Privacy preserving document indexing infrastructure for a distributed environment (SZ, WN), pp. 1638–1643.
FASEFASE-2008-AalstDGHRM #modelling #process
Correctness-Preserving Configuration of Business Process Models (WMPvdA, MD, FG, AHMtH, MLR, JM), pp. 46–61.
FoSSaCSFoSSaCS-2008-GodoyMT #decidability #morphism
Classes of Tree Homomorphisms with Decidable Preservation of Regularity (GG, SM, ST), pp. 127–141.
PEPMPEPM-2008-DjokoDF #aspect-oriented
Aspects preserving properties (SDD, RD, PF), pp. 135–145.
PLDIPLDI-2008-ChenHPECCP #compilation #object-oriented #optimisation #scalability
Type-preserving compilation for large-scale optimizing object-oriented compilers (JC, CH, FP, ME, JC, DC, PP), pp. 183–192.
AFLAFL-2008-JurgensenM #morphism
Homomorphisms Preserving Types of Density (HJ, IM), pp. 183–194.
ICALPICALP-B-2008-GomezGP #commutative #question
When Does Partial Commutative Closure Preserve Regularity? (ACG, GG, JÉP), pp. 209–220.
LATALATA-2008-Becker #self
Transformations and Preservation of Self-assembly Dynamics through Homotheties (FB), pp. 101–112.
LATALATA-2008-Leupold #on the #string #term rewriting
On Regularity-Preservation by String-Rewriting Systems (PL), pp. 345–356.
SEFMSEFM-2008-BartheKPS #hybrid #proving #verification
Preservation of Proof Pbligations for Hybrid Verification Methods (GB, CK, DP, JSF), pp. 127–136.
SEFMSEFM-2008-DjokoDF #aspect-oriented
Specialized Aspect Languages Preserving Classes of Properties (SDD, RD, PF), pp. 227–236.
ICFPICFP-2008-AhmedB #equivalence
Typed closure conversion preserves observational equivalence (AA, MB), pp. 157–168.
ICFPICFP-2008-GuillemetteM #compilation #haskell
A type-preserving compiler in Haskell (LJG, SM), pp. 75–86.
IFLIFL-2008-BrasselF #functional #lazy evaluation #logic programming #source code
From Functional Logic Programs to Purely Functional Programs Preserving Laziness (BB, SF), pp. 25–42.
GT-VCGT-VC-2007-ErmelE08 #animation #behaviour
Behavior-Preserving Simulation-to-Animation Model and Rule Transformations (CE, HE), pp. 55–74.
ICGTICGT-2008-RangelLKEB #behaviour #refactoring #using
Behavior Preservation in Model Refactoring Using DPO Transformations with Borrowed Contexts (GR, LL, BK, HE, PB), pp. 242–256.
CIKMCIKM-2008-JurczykX #database #privacy
Privacy-preserving data publishing for horizontally partitioned databases (PJ, LX), pp. 1321–1322.
ICMLICML-2008-SakumaKW #learning #privacy
Privacy-preserving reinforcement learning (JS, SK, RNW), pp. 864–871.
ICPRICPR-2008-NguyenLV #2d #locality
Ridge Regression for Two Dimensional Locality Preserving Projection (NTN, WL, SV), pp. 1–4.
ICPRICPR-2008-OhyamaNYN
Reversible data hiding of full color JPEG2000 compressed bit-stream preserving bit-depth information (SO, MN, KY, HN), pp. 1–4.
ICPRICPR-2008-SubrahmanyamRAR #reduction
Edge-preserving unscented Kalman filter for speckle reduction (GRKSS, ANR, RA, GR), pp. 1–4.
ICPRICPR-2008-WatanabeK #locality #multi
Locality preserving multi-nominal logistic regression (KW, TK), pp. 1–4.
KDDKDD-2008-YuFRKRDL #analysis #privacy
Privacy-preserving cox regression for survival analysis (SY, GF, RR, SK, RBR, CDO, PL), pp. 1034–1042.
SEKESEKE-2008-Chao #classification #data type #privacy
Privacy-preserving Classification of Data Streams (CMC), pp. 603–606.
SIGIRSIGIR-2008-NieD #topic
Separate and inequal: preserving heterogeneity in topical authority flows (LN, BDD), pp. 443–450.
ECMFAECMDA-FA-2008-EngelsKRSSW #behaviour #model transformation #process #towards #uml
From UML Activities to TAAL — Towards Behaviour-Preserving Model Transformations (GE, AK, AR, MS, CS, HW), pp. 94–109.
ECMFAECMDA-FA-2008-OldevikH #aspect-oriented #diagrams #semantics #sequence chart
Semantics Preservation of Sequence Diagram Aspects (JO, ØH), pp. 215–230.
ECOOPECOOP-2008-ArtziKE #named
ReCrash: Making Software Failures Reproducible by Preserving Object States (SA, SK, MDE), pp. 542–565.
SACSAC-2008-BeckerRHST #xml
A generic XML language for characterising objects to support digital preservation (CB, AR, VH, JS, MT), pp. 402–406.
SACSAC-2008-DingMH #approach #refinement #specification #using
An approach for specification construction using property-preserving refinement patterns (JD, LM, XH), pp. 797–803.
SACSAC-2008-GrovPMI #component #concurrent #coordination
Preserving coordination properties when transforming concurrent system components (GG, RFP, GM, AI), pp. 126–127.
SACSAC-2008-HeSVA #privacy
Privacy-preserving link discovery (XH, BS, JV, NRA), pp. 909–915.
SACSAC-2008-HuangKV #challenge #privacy
Privacy preservation services: challenges and solutions (DH, VK, MV), pp. 2110–2115.
IJCARIJCAR-2008-BartheGP #java #proving #virtual machine
Preservation of Proof Obligations from Java to the Java Virtual Machine (GB, BG, MP), pp. 83–99.
LICSLICS-2008-Duris #theorem
Hypergraph Acyclicity and Extension Preservation Theorems (DD), pp. 418–427.
DocEngDocEng-2007-ChaoGW #scalability
Preserving the aesthetics during non-fixed aspect ratio scaling of the digital border (HC, PG, AW), pp. 144–146.
DocEngDocEng-2007-TriebseesB #automation #documentation #embedded #migration #query #semantics #towards
Towards automatic document migration: semantic preservation of embedded queries (TT, UMB), pp. 209–218.
SIGMODSIGMOD-2007-ScannapiecoFBE #privacy
Privacy preserving schema and data matching (MS, IF, EB, AKE), pp. 653–664.
SIGMODSIGMOD-2007-XiaoT #dataset #named #privacy #towards
M-invariance: towards privacy preserving re-publication of dynamic datasets (XX, YT), pp. 689–700.
VLDBVLDB-2007-WongFWP #privacy
Minimality Attack in Privacy Preserving Data Publishing (RCWW, AWCF, KW, JP), pp. 543–554.
FASEFASE-2007-EhrigEEHT #bidirectional #model transformation
Information Preserving Bidirectional Model Transformations (HE, KE, CE, FH, GT), pp. 72–86.
PLDIPLDI-2007-Chlipala #assembly #compilation #λ-calculus
A certified type-preserving compiler from λ calculus to assembly language (AC), pp. 54–65.
CIAACIAA-2007-Volkov #automaton #partial order
Synchronizing Automata Preserving a Chain of Partial Orders (MVV), pp. 27–37.
HCIDHM-2007-ZhaoL #3d #image #locality #orthogonal #using
Capturing 3D Human Motion from Monocular Images Using Orthogonal Locality Preserving Projection (XZ, YL), pp. 304–313.
EDOCEDOC-2007-Kerschbaum #benchmark #enterprise #metric #privacy
Building a Privacy-Preserving Benchmarking Enterprise System (FK), pp. 87–96.
CIKMCIKM-2007-CaiHZH #locality
Regularized locality preserving indexing via spectral regression (DC, XH, WVZ, JH), pp. 741–750.
ICMLICML-2007-CortesMR #algorithm #ranking
Magnitude-preserving ranking algorithms (CC, MM, AR), pp. 169–176.
KDDKDD-2007-WanNHL #privacy
Privacy-preservation for gradient descent methods (LW, WKN, SH, VCSL), pp. 775–783.
MLDMMLDM-2007-TanN #data mining #mining #privacy #probability #re-engineering
Generic Probability Density Function Reconstruction for Randomization in Privacy-Preserving Data Mining (VYFT, SKN), pp. 76–90.
RecSysRecSys-2007-BerkovskyEKR #collaboration #distributed #privacy
Enhancing privacy and preserving accuracy of a distributed collaborative filtering (SB, YE, TK, FR), pp. 9–16.
SIGIRSIGIR-2007-SchuldtGOH #on the #retrieval
On the importance of preserving the part-order in shape retrieval (AS, BG, OO, OH), pp. 771–772.
LOPSTRLOPSTR-2007-FischerSTV #functional #lazy evaluation #partial evaluation #source code
Preserving Sharing in the Partial Evaluation of Lazy Functional Programs (SF, JS, ST, GV), pp. 74–89.
SACSAC-2007-LinL #mining #privacy #transaction
Privacy preserving itemset mining through fake transactions (JLL, JYCL), pp. 375–379.
SACSAC-2007-LongoG #protocol
A protocol to preserve a code of conduct (CL, PG), pp. 1579–1585.
LICSLICS-2007-RabinST #correctness #performance #proving
Highly Efficient Secrecy-Preserving Proofs of Correctness of Computations and Applications (MOR, RAS, CT), pp. 63–76.
RTARTA-2007-DurandS #bottom-up
Bottom-Up Rewriting Is Inverse Recognizability Preserving (ID, GS), pp. 107–121.
CASECASE-2006-KwokHLF #image #multi #optimisation #using
Intensity-Preserving Contrast Enhancement for Gray-Level Images using Multi-objective Particle Swarm Optimization (NMK, QPH, DL, GF), pp. 21–26.
DACDAC-2006-WongC #matrix #performance
A fast passivity test for descriptor systems via structure-preserving transformations of Skew-Hamiltonian/Hamiltonian matrix pencils (NW, CKC), pp. 261–266.
DACDAC-2006-YuSH #analysis #grid #order #performance #power management #reduction
Fast analysis of structured power grid by triangularization based structure preserving model order reduction (HY, YS, LH), pp. 205–210.
DocEngDocEng-2006-TriebseesB #constraints #documentation #migration
Preservation-centric and constraint-based migration of digital documents (TT, UMB), pp. 59–61.
PODSPODS-2006-KolahiL #dependence #normalisation #on the
On redundancy vs dependency preservation in normalization: an information-theoretic study of 3NF (SK, LL), pp. 114–123.
SIGMODSIGMOD-2006-XiaoT #personalisation #privacy
Personalized privacy preservation (XX, YT), pp. 229–240.
VLDBVLDB-2006-XiaoT #effectiveness #named #privacy
Anatomy: Simple and Effective Privacy Preservation (XX, YT), pp. 139–150.
PLDIPLDI-2006-VechevYB #algorithm #concurrent #garbage collection
Correctness-preserving derivation of concurrent garbage collection algorithms (MTV, EY, DFB), pp. 341–353.
CIAACIAA-2006-Maletti #question
Does o-Substitution Preserve Recognizability? (AM), pp. 150–161.
CIAACIAA-2006-MesserschmidtMOP #complexity #correctness
Correctness Preservation and Complexity of Simple RL-Automata (HM, FM, FO, MP), pp. 162–172.
ICALPICALP-v2-2006-AlurCZ #refinement
Preserving Secrecy Under Refinement (RA, PC, SZ), pp. 107–118.
ICFPICFP-2006-DenielouL #abstraction #distributed #type system
Abstraction preservation and subtyping in distributed languages (PMD, JJL), pp. 286–297.
SOFTVISSOFTVIS-2006-Jucknath-JohnGT #development #layout #modelling
Evolutionary layout: preserving the mental map during the development of class models (SJJ, DG, GT), pp. 165–166.
CIKMCIKM-2006-CongFG
Annotation propagation revisited for key preserving views (GC, WF, FG), pp. 632–641.
CIKMCIKM-2006-KapoorPTT #database #distributed #mining #privacy
Privacy preserving sequential pattern mining in distributed databases (VK, PP, FT, MT), pp. 758–767.
CIKMCIKM-2006-VardeRRBMS #clustering #design #semantics
Designing semantics-preserving cluster representatives for scientific input conditions (ASV, EAR, CR, DCB, MM, RDSJ), pp. 708–717.
ICMLICML-2006-LawrenceC #constraints #distance
Local distance preservation in the GP-LVM through back constraints (NDL, JQC), pp. 513–520.
ICPRICPR-v2-2006-LahdenojaALP #parametricity #symmetry
A Shape-Preserving Non-parametric Symmetry Transform (OL, EA, ML, AP), pp. 373–377.
ICPRICPR-v2-2006-MinS #estimation
Edge-preserving Simultaneous Joint Motion-Disparity Estimation (DBM, KS), pp. 74–77.
ICPRICPR-v2-2006-ZhengL #analysis #component #kernel #learning #locality #problem
Regularized Locality Preserving Learning of Pre-Image Problem in Kernel Principal Component Analysis (WSZ, JHL), pp. 456–459.
ICPRICPR-v3-2006-ArcelliBS #3d #set
A New Set of Topology Preserving Removal Operations in the 3D Space (CA, GSdB, LS), pp. 1055–1058.
ICPRICPR-v3-2006-ChenY06a #adaptation #equation #image
A new adaptive diffusion equation for image noise removal and feature preservation (SC, XY), pp. 885–888.
ICPRICPR-v3-2006-StelldingerL06b #3d #re-engineering
3D Object Digitization: Topology Preserving Reconstruction (PS, LJL), pp. 693–696.
ICPRICPR-v4-2006-YuC06a #segmentation #statistics #using
Filament Preserving Segmentation for SAR Sea Ice Imagery Using a New Statistical Model (QY, DAC), pp. 849–852.
KDDKDD-2006-AggarwalPZ #data mining #mining #on the #privacy
On privacy preservation against adversarial data mining (CCA, JP, BZ), pp. 510–516.
KDDKDD-2006-BrickellS #performance
Efficient anonymity-preserving data collection (JB, VS), pp. 76–85.
KDDKDD-2006-WongLFW #privacy
(alpha, k)-anonymity: an enhanced k-anonymity model for privacy preserving data publishing (RCWW, JL, AWCF, KW), pp. 754–759.
SACSAC-2006-AimeurBFO #privacy
Privacy-preserving demographic filtering (EA, GB, JMF, FSMO), pp. 872–878.
SACSAC-2006-AtzoriBGP #towards
Towards low-perturbation anonymity preserving pattern discovery (MA, FB, FG, DP), pp. 588–592.
SACSAC-2006-BaragliaLOSS #privacy #recommendation #web
A privacy preserving web recommender system (RB, CL, SO, MS, FS), pp. 559–563.
SACSAC-2006-GuoW #data mining #mining #on the #privacy
On the use of spectral filtering for privacy preserving data mining (SG, XW), pp. 622–626.
SACSAC-2006-YuJV #kernel #privacy #using
Privacy-preserving SVM using nonlinear kernels on horizontally partitioned data (HY, XJ, JV), pp. 603–610.
ISSTAISSTA-2006-ZhangKPWJMZ #analysis
The case for analysis preserving language transformation (XZ, LK, MP, SW, TJ, GM, LZ), pp. 191–202.
VMCAIVMCAI-2006-RanzatoT #abstract interpretation
Strong Preservation of Temporal Fixpoint-Based Operators by Abstract Interpretation (FR, FT), pp. 332–347.
WICSAWICSA-2005-TibermacineFS #architecture #component #development #process
Preserving Architectural Choices throughout the Component-based Software Development Process (CT, RF, SS), pp. 121–130.
DACDAC-2005-ZhangCHGC #analysis #polynomial #statistics
Correlation-preserved non-gaussian statistical timing analysis with quadratic timing model (LZ, WC, YH, JAG, CCPC), pp. 83–88.
DACDAC-2005-ZhouMA #reduction
Structure preserving reduction of frequency-dependent interconnect (QZ, KM, ACA), pp. 939–942.
PODSPODS-2005-Gehrke #analysis #modelling #privacy #tutorial
Models and methods for privacy-preserving data publishing and analysis: invited tutorial (JG), p. 316.
SIGMODSIGMOD-2005-AgrawalST #privacy
Privacy Preserving OLAP (RA, RS, DT), pp. 251–262.
VLDBVLDB-2005-BarbosaFM #design #information management #xml
Designing Information-Preserving Mapping Schemes for XML (DB, JF, AOM), pp. 109–120.
VLDBVLDB-2005-BohannonFFN #xml
Information Preserving XML Schema Embedding (PB, WF, MF, PPSN), pp. 85–96.
VLDBVLDB-2005-ZhangZ #distributed #information management #privacy
Distributed Privacy Preserving Information Sharing (NZ, WZ), pp. 889–900.
TACASTACAS-2005-RanzatoT #abstract interpretation #algorithm #refinement
An Abstract Interpretation-Based Refinement Algorithm for Strong Preservation (FR, FT), pp. 140–156.
CIAACIAA-2005-BaillyCS #behaviour #communication #component #composition #contract
Component Composition Preserving Behavioural Contracts Based on Communication Traces (AB, MC, ISR), pp. 54–65.
ICALPICALP-2005-AtseriasDG #finite
Preservation Under Extensions on Well-Behaved Finite Structures (AA, AD, MG), pp. 1437–1449.
ICEISICEIS-v3-2005-BassilRKKR #process
Preserving the Context of Interrupted Business Process Activities (SB, SR, RKK, PGK, MR), pp. 38–45.
CIKMCIKM-2005-FanLHB #approach #novel #privacy #video
A novel approach for privacy-preserving video sharing (JF, HL, MSH, EB), pp. 609–616.
ICMLICML-2005-HeCM #analysis #locality #statistics
Statistical and computational analysis of locality preserving projection (XH, DC, WM), pp. 281–288.
KDDKDD-2005-JagannathanW #clustering #distributed #privacy
Privacy-preserving distributed k-means clustering over arbitrarily partitioned data (GJ, RNW), pp. 593–599.
KDDKDD-2005-YangZW
Anonymity-preserving data collection (ZY, SZ, RNW), pp. 334–343.
KDDKDD-2005-ZhangWZ #classification #privacy
A new scheme on privacy-preserving data classification (NZ, SW, WZ), pp. 374–383.
SIGIRSIGIR-2005-CaiH #locality #orthogonal
Orthogonal locality preserving indexing (DC, XH), pp. 3–10.
SACSAC-2005-ZhangM #learning #privacy
Privacy preserving learning in negotiation (SZ, FM), pp. 821–825.
LICSLICS-2005-Rossman
Existential Positive Types and Preservation under Homomorphisisms (BR), pp. 467–476.
DACDAC-2004-WongBK #performance #reduction
Passivity-preserving model reduction via a computationally efficient project-and-balance scheme (NW, VB, CKK), pp. 369–374.
DATEDATE-v1-2004-LiPZSSS
State-Preserving vs. Non-State-Preserving Leakage Control in Caches (YL, DP, YZ, KS, MRS, KS), pp. 22–29.
HTHT-2004-MarshallG #hypermedia #requirements
Saving private hypertext: requirements and pragmatic dimensions for preservation (CCM, GG), pp. 130–138.
PODSPODS-2004-AtseriasDK #morphism #on the #query
On Preservation under Homomorphisms and Unions of Conjunctive Queries (AA, AD, PGK), pp. 319–329.
SIGMODSIGMOD-2004-AgrawalKSX #encryption
Order-Preserving Encryption for Numeric Data (RA, JK, RS, YX), pp. 563–574.
VLDBVLDB-2004-HoreMT #privacy #query
A Privacy-Preserving Index for Range Queries (BH, SM, GT), pp. 720–731.
ESOPESOP-2004-RanzatoT #abstract interpretation
Strong Preservation as Completeness in Abstract Interpretation (FR, FT), pp. 18–32.
IFMIFM-2004-SeceleanuP #approach #design #uml
Constituent Elements of a Correctness-Preserving UML Design Approach (TS, JP), pp. 227–246.
CSCWCSCW-2004-LiL #editing
Preserving operation effects relation in group editors (DL, RL), pp. 457–466.
ICPRICPR-v2-2004-KoskelaLO #clustering #image #metric #retrieval
Entropy-Based Measures for Clustering and SOM Topology Preservation Applied to Content-Based Image Indexing and Retrieval (MK, JL, EO), pp. 1005–1009.
ICPRICPR-v2-2004-OkataniS #image
Range Image Registration Preserving Local Structures of Object Surfaces (ISO, AS), pp. 224–228.
ICPRICPR-v2-2004-TremblaisA #algorithm #detection #multi #performance
A Fast Multiscale Edge Detection Algorithm Based on a New Edge Preserving PDE Resolution Scheme (BT, BA), pp. 811–814.
ICPRICPR-v4-2004-Syeda-Mahmood #clustering
Order-Preserving Clustering and Its Application to Gene Expression Data (TFSM), pp. 637–640.
KDDKDD-2004-SanilKLR #distributed #modelling #privacy
Privacy preserving regression modelling via distributed computation (APS, AFK, XL, JPR), pp. 677–682.
KDDKDD-2004-WrightY #distributed #network #privacy #semistructured data
Privacy-preserving Bayesian network structure computation on distributed heterogeneous data (RNW, ZY), pp. 713–718.
KDDKDD-2004-ZhuL #data mining #mining #privacy
Optimal randomization for privacy preserving data mining (MYZ, LL), pp. 761–766.
SIGIRSIGIR-2004-HeCLM #documentation #locality #representation
Locality preserving indexing for document representation (XH, DC, HL, WYM), pp. 96–103.
PADLPADL-2004-AtanassowCJ #haskell #named #xml
UUXML: A Type-Preserving XML Schema-Haskell Data Binding (FA, DC, JJ), pp. 71–85.
LDTALDTA-2004-LohmannRS #attribute grammar #migration #recursion #semantics
Semantics-preserving Migration of Semantic Rules During Left Recursion Removal in Attribute Grammars (WL, GR, MS), pp. 133–148.
HPDCHPDC-2004-GilburdSW #data mining #mining #privacy
Privacy-Preserving Data Mining on Data Grids in the Presence of Malicious Participants (BG, AS, RW), pp. 225–234.
FATESFATES-2004-Frutos-EscrigG #consistency
Preserving Contexts for Soft Conformance Relation (DdFE, CGR), pp. 33–48.
LICSLICS-2004-BaldamusPV #π-calculus
Sπ Calculus Translated to ?--Calculus Preserving May-Tests (MB, JP, BV), pp. 22–31.
VMCAIVMCAI-2004-BartheBR #compilation #security
Security Types Preserving Compilation: (Extended Abstract) (GB, AB, TR), pp. 2–15.
DocEngDocEng-2003-RodigBSS #implementation
Preservation of digital publications: an OAIS extension and implementation (PR, UMB, JS, LS), pp. 131–139.
PODSPODS-2003-DinurN #privacy
Revealing information while preserving privacy (ID, KN), pp. 202–210.
PODSPODS-2003-EvfimievskiGS #data mining #mining #privacy
Limiting privacy breaches in privacy preserving data mining (AVE, JG, RS), pp. 211–222.
PODSPODS-2003-Gross-Amblard #database #documentation #relational #xml
Query-preserving watermarking of relational databases and XML documents (DGA), pp. 191–201.
VLDBVLDB-2003-BawaBA #documentation #network #privacy
Privacy-Preserving Indexing of Documents on the Network (MB, RJBJ, RA), pp. 922–933.
DLTDLT-2003-HofbauerW #string #term rewriting
Deleting String Rewriting Systems Preserve Regularity (DH, JW), pp. 337–348.
KDDKDD-2003-DuZ #data mining #mining #privacy #random #using
Using randomized response techniques for privacy-preserving data mining (WD, JZZ), pp. 505–510.
KDDKDD-2003-VaidyaC #clustering #privacy
Privacy-preserving k-means clustering over vertically partitioned data (JV, CC), pp. 206–215.
UMLUML-2003-Nunes #contract #ocl
An OCL Extension for Low-Coupling Preserving Contracts (IN), pp. 310–324.
CCCC-2003-LeagueST #compilation #java #precise
Precision in Practice: A Type-Preserving Java Compiler (CL, ZS, VT), pp. 106–120.
SOSPSOSP-2003-ManiatisRRBGM
Preserving peer replicas by rate-limited sampled voting (PM, DSHR, MR, MB, TJG, YM), pp. 44–59.
RTARTA-2003-WellsPK #diagrams
Diagrams for Meaning Preservation (JBW, DP, FK), pp. 88–106.
DACDAC-2002-SuBK #framework #reduction
A factorization-based framework for passivity-preserving model reduction of RLC systems (QS, VB, CKK), pp. 40–45.
SASSAS-2002-RanzatoT #model checking
Making Abstract Model Checking Strongly Preserving (FR, FT), pp. 411–427.
ICGTICGT-2002-MensDJ #behaviour #formal method #program transformation
Formalising Behaviour Preserving Program Transformations (TM, SD, DJ), pp. 286–301.
ICEISICEIS-2002-Al-JumailyCM #constraints #execution #relational
An Execution Model for Preserving Cardinality Constraints in the Relational Model (HTAJ, DC, PM), pp. 819–822.
ICPRICPR-v1-2002-NiimiNKE #image
Luminance Quasi-Preserving Color Quantization for Digital Steganography to Palette-Based Images (MN, HN, EK, ROE), pp. 252–254.
ICPRICPR-v2-2002-Chen
Signal Processing for Preserving the Environment (CHC), p. 523.
ICPRICPR-v3-2002-PawlakR #image
Non-Linear Local Harmonic Filters For Edge-Preserving Image Denoising (MP, ER), pp. 895–897.
KDDKDD-2002-EvfimievskiSAG #mining #privacy
Privacy preserving mining of association rules (AVE, RS, RA, JG), pp. 217–228.
KDDKDD-2002-VaidyaC #mining #privacy
Privacy preserving association rule mining in vertically partitioned data (JV, CC), pp. 639–644.
UMLUML-2002-EngelsHKG #evolution
Consistency-Preserving Model Evolution through Transformations (GE, RH, JMK, LG), pp. 212–226.
OOPSLAOOPSLA-2002-ShufGFAS #garbage collection #java #locality
Creating and preserving locality of java applications at allocation and garbage collection times (YS, MG, HF, AWA, JPS), pp. 13–25.
PADLPADL-2002-VandeginsteSD #garbage collection #order #prolog
Segment Order Preserving and Generational Garbage Collection for Prolog (RV, KFS, BD), pp. 299–317.
SACSAC-2002-Naharro-BerrocalPUV #reduction #visual notation #visualisation
Approaches to comprehension-preserving graphical reduction of program visualizations (FNB, CPF, JUF, JÁVI), pp. 771–777.
RTARTA-2002-SekiTFK #term rewriting
Layered Transducing Term Rewriting System and Its Recognizability Preserving Property (HS, TT, YF, YK), pp. 98–113.
DACDAC-2001-BhanjaR #dependence #modelling #network #probability #process #using
Dependency Preserving Probabilistic Modeling of Switching Activity using Bayesian Networks (SB, NR), pp. 209–214.
PODSPODS-2001-AgrawalA #algorithm #data mining #design #mining #on the #privacy #quantifier
On the Design and Quantification of Privacy Preserving Data Mining Algorithms (DA, CCA).
VLDBVLDB-2001-Duranti #authentication
The Long-Term Preservation of Authentic Electronic Records (LD), pp. 625–628.
FASEFASE-J-1998-PadbergGE01 #refinement #rule-based #safety
Rule-based refinement of high-level nets preserving safety properties (JP, MG, CE), pp. 97–118.
SCAMSCAM-2001-Vanter #source code #tool support
Preserving the Documentary Structure of Source Code in Language-Based Transformation Tools (MvdV), pp. 133–143.
STOCSTOC-2001-NaorN #communication #evaluation #protocol
Communication preserving protocols for secure function evaluation (MN, KN), pp. 590–599.
FMFME-2001-Jurjens #refinement
Secrecy-Preserving Refinement (JJ), pp. 135–152.
SIGIRSIGIR-2001-SaraivaMFMRZ #scalability
Rank-Preserving Two-Level Caching for Scalable Search Engines (PCS, ESdM, RCF, WMJ, BARN, NZ), pp. 51–58.
POPLPOPL-2001-WangA #garbage collection
Type-preserving garbage collectors (DCW, AWA), pp. 166–178.
DACDAC-2000-MeguerdichianP
Watermarking while preserving the critical path (SM, MP), pp. 108–111.
SIGMODSIGMOD-2000-AgrawalS #data mining #mining #privacy
Privacy-Preserving Data Mining (RA, RS), pp. 439–450.
FASEFASE-2000-PadbergHG #algebra #safety
Stepwise Introduction and Preservation of Safety Properties in Algebraic High-Level Net Systems (JP, KH, MG), pp. 249–265.
ICSMEICSM-2000-Chapin #roadmap
Trends in Preserving and Enhancing the Value of Software (NC), pp. 6–8.
ICSMEICSM-2000-GibsonDM #correctness #maintenance
The Application of Correctness Preserving Transformations to Software Maintenance (JPG, TFD, BAM), p. 108–?.
ICSMEICSM-2000-Olver #perspective
Preserving the Value of Software — A CIO Perspective (THO), p. 9–?.
STOCSTOC-2000-Vadhan #complexity #interactive #on the #proving
On transformation of interactive proofs that preserve the prover’s complexity (SPV), pp. 200–207.
ICMLICML-2000-SebbanN #problem
Instance Pruning as an Information Preserving Problem (MS, RN), pp. 855–862.
ICPRICPR-v3-2000-SmolkaW #image #random
Edge Preserving Image Smoothing Based on Self Avoiding Random Walk (BS, KWW), pp. 3668–3671.
POPLPOPL-2000-KomondoorH #semantics
Semantics-Preserving Procedure Extraction (RK, SH), pp. 155–169.
RTARTA-2000-TakaiKS #effectiveness #finite #linear #term rewriting
Right-Linear Finite Path Overlapping Term Rewriting Systems Effectively Preserve Recognizability (TT, YK, HS), pp. 246–260.
PODSPODS-1999-Raman #clustering #database #locality #theory and practice
Locality Preserving Dictionaries: Theory and Application to Clustering in Databases (VR), pp. 337–345.
STOCSTOC-1999-CrescenzoI
Security-Preserving Hardness-Amplification for Any Regular One-Way Function (GDC, RI), pp. 169–178.
DLTDLT-1999-KvetonK
Functions preserving classes of languages (PK, VK), pp. 81–102.
FMFM-v2-1999-Moreira #component #proving
Proof Preservation in Component Generalization (AMM), p. 1866.
TLCATLCA-1999-Ritter #termination
Characterising Explicit Substitutions which Preserve Termination (ER), pp. 325–339.
FASEFASE-1998-PadbergGE #refinement #rule-based #safety
Rule-Based Refinement of High-Level Nets Preserving Safety Properties (JP, MG, CE), pp. 221–238.
ICGTTAGT-1998-SkodinisW
Neighborhood-Preserving Node Replacements (KS, EW), pp. 45–58.
ICPRICPR-1998-ArcelliS #parallel
Parallel lowering of digital pictures by topology preserving operations (CA, LS), pp. 1601–1603.
ICPRICPR-1998-Heikkila #bound #detection
Moment and curvature preserving technique for accurate ellipse boundary detection (JH), pp. 734–737.
ICPRICPR-1998-MottlKK #image
Edge-preserving in generalized smoothing of signals and images (VM, AK, AK), pp. 1579–1581.
ICPRICPR-1998-SeemannT #image #segmentation #using
Structure preserving noise filtering of images using explicit local segmentation (TS, PET), pp. 1610–1612.
OOPSLAOOPSLA-1998-AgerboC #design pattern #how
How to Preserve the Benefits of Design Patterns (EA, AC), pp. 134–143.
DACDAC-1997-KernsY #congruence #network #reduction
Preservation of Passivity During RLC Network Reduction via Split Congruence Transformations (KJK, ATY), pp. 34–39.
STOCSTOC-1997-IndykMRV #multi
Locality-Preserving Hashing in Multidimensional Spaces (PI, RM, PR, SV), pp. 618–625.
CAiSECAiSE-1997-CathalaP #behaviour #how #why
Preserving Behaviour: Why and How (FC, PP), pp. 333–346.
LOPSTRLOPSTR-1997-LeuschelMS #logic programming #source code #termination
Preserving Termination of Tabled Logic Programs While Unfolding (ML, BM, KFS), pp. 189–205.
RTARTA-1997-Otto #on the #string #term rewriting
On the Property of Preserving Regularity for String-Rewriting Systems (FO), pp. 83–97.
PLDIPLDI-1996-EichenbergerD #constraints #multi #pipes and filters #scheduling
A Reduced Multipipeline Machine Description that Preserves Scheduling Constraints (AEE, ESD), pp. 12–22.
ICPRICPR-1996-ChiuT #algorithm
A feature-preserved thinning algorithm for handwritten Chinese characters (HPC, DCT), pp. 235–239.
ICPRICPR-1996-MeminP #robust
Robust discontinuity-preserving model for estimating optical flow (ÉM, PP), pp. 920–924.
PPDPALP-1996-FerreiraKP #composition #normalisation #λ-calculus
λ-Calculi with Explicit Substitutions and Composition Which Preserve β-Strong Normalization (MCFF, DK, LP), pp. 284–298.
LOPSTRLOPSTR-1996-BossiC #termination
Replacement Can Preserve Termination (AB, NC), pp. 104–129.
SACSAC-1996-DemoenET #garbage collection #order #prolog
Segment order preserving copying garbage collection for WAM based Prolog (BD, GE, PT), pp. 380–386.
LICSLICS-1996-Munoz #calculus #confluence #normalisation
Confluence and Preservation of Strong Normalisation in an Explicit Substitutions Calculus (CAM), pp. 440–447.
RTARTA-1996-BlooR #combinator #reduction
Combinatory Reduction Systems with Explicit Substitution that Preserve Strong Nomalisation (RB, KHR), pp. 169–183.
DACDAC-1995-El-MalehMRM #on the #testing
On Test Set Preservation of Retimed Circuits (AHEM, TEM, JR, WM), pp. 176–182.
SEKESEKE-1995-BernardeschiFP #architecture #correctness #interactive #specification #user interface
Application of Correctness Preserving Transformations for Deriving Architectural Descriptions of Interactive Systems from User Interface Specifications (CB, AF, FP), pp. 234–243.
LOPSTRLOPSTR-1995-Leuschel #constraints #deduction
Ecological Partial Deduction: Preserving Characteristic Trees Without Constraints (ML), pp. 1–16.
VLDBVLDB-1994-LitwinNS #data type #distributed #order #product line #scalability
RP*: A Family of Order Preserving Scalable Distributed Data Structures (WL, MAN, DAS), pp. 342–353.
CIKMCIKM-1994-VidalW #integration #semantics
Preserving Update Semantics in Schema Integration (VMPV, MW), pp. 263–271.
PPDPALP-1994-BossiC #termination
Preserving Universal Termination through Unfold/Fold (AB, NC), pp. 269–286.
LOPSTRLOPSTR-1994-BossiE #semantics #source code
More on Unfold/Fold Transformations of Normal Programs: Preservation of Fitting’s Semantics (AB, SE), pp. 311–331.
CHIINTERCHI-1993-HerbslebK #design #what
Preserving knowledge in design projects: what designers need to know (JDH, EK), pp. 7–14.
SEKESEKE-1993-StaryF #design #how #semantics #specification
How Semantical Design Languages Help to Preserve Specification/Design-Consistency (CS, RF), pp. 462–471.
FSEFSE-1993-Griswold #data flow
Direct Update of Data Flow Representations for a Meaning-Preserving Program Restructuring Tool (WGG), pp. 42–55.
CAVCAV-1993-BrinksmaLB #composition
Functionality Decomposition by Compositional Correstness Preserving Transformation (EB, RL, PB), pp. 371–384.
DACDAC-1992-BatekH #logic
Test-Set Preserving Logic Transformations (MJB, JPH), pp. 454–458.
PPDPPLILP-1992-Amtoft #termination
Unfold/fold Transformations Preserving Termination Properties (TA), pp. 187–201.
CAVCAV-1992-BensalemBLS #simulation
Property Preserving Simulations (SB, AB, CL, JS), pp. 260–273.
PEPMPEPM-1991-ProiettiP #prolog #semantics
Semantics Preserving Transformation Rules for Prolog (MP, AP), pp. 274–284.
ICALPICALP-1991-Vogler #similarity
Deciding History Preserving Bisimilarity (WV), pp. 495–505.
OOPSLAOOPSLA-1991-Bergstein
Object-Preserving Class Transformations (PLB), pp. 299–313.
DACDAC-1990-Marple
A Hierarchy Preserving Hierarchical Compactor (DM), pp. 375–381.
SIGIRSIGIR-1990-FoxCDH #information retrieval #order
Order Preserving Minimal Perfect Hash Functions and Information Retrieval (EAF, QFC, AMD, LSH), pp. 279–311.
PPDPALP-1990-Sato #equivalence #first-order
An Equivalence Preserving First Order Unfold/fold Transformation System (TS), pp. 173–188.
STOCSTOC-1989-KochLMRR #network
Work-Preserving Emulations of Fixed-Connection Networks (Extended Abstract) (RRK, FTL, BMM, SR, ALR), pp. 227–240.
ICLPJICSCP-1988-Fribourg88 #induction #prolog #source code
Equivalence-Preserving Transformations of Inductive Properties of Prolog Programs (LF), pp. 893–908.
PODSPODS-1986-Robinson #linear #order #statistics #using
Order Preserving Linear Hashing Using Dynamic Key Statistics (JTR), pp. 91–99.
VLDBVLDB-1985-OzkarahanO #clustering #database #order
Dynamic and Order Preserving Data Partitioning for Database Machines (EAO, AMO), pp. 358–368.
VLDBVLDB-1983-KlopproggeL #concept #database #modelling
Modelling Information Preserving Databases: Consequences of the Concept of Time (MRK, PCL), pp. 399–416.
POPLPOPL-1981-Lowney #array
Carrier Arrays: An Idiom-Preserving Extension to APL (PGL), pp. 1–13.
ICALPICALP-1979-Nijholt #recursion
Structure Preserving Transformations on Non-Left-Recursive Grammars (Preliminary Version) (AN), pp. 446–459.
VLDBVLDB-1978-AroraC #database #relational
The Information Preserving Properties of Relational Database Transformations (AKA, CRC), pp. 352–359.
ICALPICALP-1977-AusielloDP #combinator #on the #problem #reduction
On the Structure of Combinatorial Problems and Structure Preserving Reductions (GA, AD, MP), pp. 45–60.
POPLPOPL-1975-Gerhart #program transformation
Correctness-Preserving Program Transformations (SLG), pp. 54–66.

Bibliography of Software Language Engineering in Generated Hypertext (BibSLEIGH) is created and maintained by Dr. Vadim Zaytsev.
Hosted as a part of SLEBOK on GitHub.