447 papers:
- CASE-2015-HandokoL #order #performance #privacy
- Efficient order sharing with privacy preservation via double auction with split delivery (SDH, HCL), pp. 69–74.
- DAC-2015-SonghoriHSK #logic #nearest neighbour #privacy #synthesis #using
- Compacting privacy-preserving k-nearest neighbor search using logic synthesis (EMS, SUH, ARS, FK), p. 6.
- DATE-2015-KonstantinouKM #encryption #functional #privacy #verification
- Privacy-preserving functional IP verification utilizing fully homomorphic encryption (CK, AK, MM), pp. 333–338.
- SIGMOD-2015-MavroforakisCOK #composition #encryption #revisited
- Modular Order-Preserving Encryption, Revisited (CM, NC, AO, GK, RC), pp. 763–777.
- VLDB-2015-SeahBS #concept #image #named #social #summary
- PRISM: Concept-preserving Summarization of Top-K Social Image Search Results (BSS, SSB, AS), pp. 1868–1879.
- STOC-2015-DworkFHPRR #adaptation #data analysis #statistics
- Preserving Statistical Validity in Adaptive Data Analysis (CD, VF, MH, TP, OR, ALR), pp. 117–126.
- FM-2015-DiekmannHC #semantics #set
- Semantics-Preserving Simplification of Real-World Firewall Rule Sets (CD, LH, GC), pp. 195–212.
- CHI-2015-PlimmerHZKYJBD #interactive #tool support
- New Interaction Tools for Preserving an Old Language (BP, LH, TZ, KK, AWY, GJ, RB, EYLD), pp. 3493–3502.
- CHI-2015-RenaudM #privacy
- Regulating Access to Adult Content (with Privacy Preservation) (KR, JM), pp. 4019–4028.
- ICEIS-v2-2015-SmirnovP #architecture #hybrid #network #peer-to-peer #privacy #recommendation
- Privacy-preserving Hybrid Peer-to-Peer Recommendation System Architecture — Locality-Sensitive Hashing in Structured Overlay Network (AVS, AP), pp. 532–542.
- ICML-2015-AnBB #how #linear #network #question
- How Can Deep Rectifier Networks Achieve Linear Separability and Preserve Distances? (SA, FB, MB), pp. 514–523.
- KDD-2015-KarakasidisKV #privacy #scalability
- Scalable Blocking for Privacy Preserving Record Linkage (AK, GK, VSV), pp. 527–536.
- SIGIR-2015-YangS #information retrieval #privacy #security
- Privacy-Preserving IR 2015: When Information Retrieval Meets Privacy and Security (HY, IS), pp. 1157–1158.
- MoDELS-J-2011-Steimann15 #refactoring
- From well-formedness to meaning preservation: model refactoring for almost free (FS), pp. 307–320.
- MoDELS-J-2011-Steimann15 #refactoring
- From well-formedness to meaning preservation: model refactoring for almost free (FS), pp. 307–320.
- AMT-2015-DyckGLSG #automation #behaviour #model transformation #towards #verification
- Towards the Automatic Verification of Behavior Preservation at the Transformation Level for Operational Model Transformations (JD, HG, LL, SS, SG), pp. 36–45.
- SAC-2015-HanHQY #clustering
- Locality-preserving L1-graph and its application in clustering (SH, HH, HQ, DY), pp. 813–818.
- ICSE-v1-2015-PetersML #fault #named #predict #privacy
- LACE2: Better Privacy-Preserving Data Sharing for Cross Project Defect Prediction (FP, TM, LL), pp. 801–811.
- LICS-2015-EndrullisGH #encoding
- Regularity Preserving but Not Reflecting Encodings (JE, CG, DH), pp. 535–546.
- DocEng-2014-DavisonMM #named #privacy #semantics #similarity
- P-GTM: privacy-preserving google tri-gram method for semantic text similarity (OD, AM, EEM), pp. 81–84.
- SIGMOD-2014-Dev14a #community #detection #graph #precise #privacy #social
- Privacy preserving social graphs for high precision community detection (HD), pp. 1615–1616.
- VLDB-2014-LiXZJ #named #privacy
- DPSynthesizer: Differentially Private Data Synthesizer for Privacy Preserving Data Sharing (HL, LX, LZ, XJ), pp. 1677–1680.
- PEPM-2014-LeatherJLS #semantics
- Type-changing rewriting and semantics-preserving transformation (SL, JJ, AL, BS), pp. 109–120.
- STOC-2014-DworkTT0 #analysis #bound #component #privacy
- Analyze gauss: optimal bounds for privacy-preserving principal component analysis (CD, KT, AT, LZ), pp. 11–20.
- CIAA-2014-Maletti #bottom-up #multi #power of #transducer
- The Power of Regularity-Preserving Multi Bottom-up Tree Transducers (AM), pp. 278–289.
- ICALP-v1-2014-BasavarajuFGMRS #algorithm
- Parameterized Algorithms to Preserve Connectivity (MB, FVF, PAG, PM, MSR, SS), pp. 800–811.
- CHI-2014-BalestriniBMZR #case study #community #comprehension
- Understanding sustained community engagement: a case study in heritage preservation in rural argentina (MB, JB, PM, AZ, YR), pp. 2675–2684.
- CHI-2014-PanS #multi
- A gaze-preserving situated multiview telepresence system (YP, AS), pp. 2173–2176.
- ICEIS-v1-2014-FreireCSS #process #query #semantics
- Preserving the Original Query Semantics in Routing Processes (CF, NC, DS, ACS), pp. 70–80.
- CIKM-2014-DongLW #as a service #named #privacy
- PraDa: Privacy-preserving Data-Deduplication-as-a-Service (BD, RL, WHW), pp. 1559–1568.
- CIKM-2014-VatsalanC #database #multi #privacy #scalability
- Scalable Privacy-Preserving Record Linkage for Multiple Databases (DV, PC), pp. 1795–1798.
- CIKM-2014-WuZYJL #distributed #named #rdf #semantics
- SemStore: A Semantic-Preserving Distributed RDF Triple Store (BW, YZ, PY, HJ, LL), pp. 509–518.
- ICML-c2-2014-PachecoZBS
- Preserving Modes and Messages via Diverse Particle Selection (JP, SZ, MJB, EBS), pp. 1152–1160.
- ICPR-2014-DanckaersHLLVDS
- Correspondence Preserving Elastic Surface Registration with Shape Model Prior (FD, TH, DL, AL, SV, SVD, JS), pp. 2143–2148.
- ICPR-2014-FranchiA #adaptation
- Spatially-Variant Area Openings for Reference-Driven Adaptive Contour Preserving Filtering (GF, JA), pp. 1043–1048.
- ICPR-2014-HuangZLW #distance #feature model
- A Method of Discriminative Information Preservation and In-Dimension Distance Minimization Method for Feature Selection (SH, JZ, XL, LW), pp. 1615–1620.
- ICPR-2014-RehnS #locality #visual notation
- Nonlinear Supervised Locality Preserving Projections for Visual Pattern Discrimination (EMR, HS), pp. 1568–1573.
- ICPR-2014-YanJY #feature model #representation
- Sparse Representation Preserving for Unsupervised Feature Selection (HY, ZJ, JY), pp. 1574–1578.
- ICPR-2014-ZhangZZL #image
- Surface Interpolation to Image with Edge Preserving (LZ, CZ, YZ, XL), pp. 1055–1060.
- KDD-2014-AcsC #case study #privacy
- A case study: privacy preserving release of spatio-temporal density in paris (GÁ, CC), pp. 1679–1688.
- KEOD-2014-BakhshandehKAYC #ontology
- A Digital Preservation-Legal Ontology (MB, BKR, GA, SAY, AC, JLB), pp. 215–222.
- SIGIR-2014-SeahBS #concept #image #named #social #summary
- PRISM: concept-preserving social image search results summarization (BSS, SSB, AS), pp. 737–746.
- SIGIR-2014-SiY #information retrieval #privacy #security
- Privacy-preserving IR: when information retrieval meets privacy and security (LS, HY), p. 1295.
- SIGIR-2014-ZhangWRS #performance #recommendation
- Preference preserving hashing for efficient recommendation (ZZ, QW, LR, LS), pp. 183–192.
- PPDP-2014-KranzS #compilation #domain-specific language #functional #integration #legacy #performance
- Structure-Preserving Compilation: Efficient Integration of Functional DSLs into Legacy Systems (JK, AS), pp. 187–198.
- SAC-2014-A #authentication #health #mobile #network #privacy #research #student
- Student research abstract: a privacy-preserving profile matching based authentication system for mobile health networks (DHA), pp. 196–197.
- SAC-2014-BaeLKWP #network #privacy #social
- Analyzing network privacy preserving methods: a perspective of social network characteristics (DHB, JML, SWK, YW, YP), pp. 331–332.
- SAC-2014-BasuCKMVG0M #feedback #privacy #social
- Privacy preserving trusted social feedback (AB, JCC, SK, SM, JV, GG, JZ, YM), pp. 1706–1711.
- SAC-2014-PetrlicLS #privacy
- Privacy-preserving reputation management (RP, SL, CS), pp. 1712–1718.
- SAC-2014-PetroccoCPE #performance
- Hiding user content interest while preserving P2P performance (RP, MC, JAP, DHJE), pp. 501–508.
- FSE-2014-MirakhorliFGWC #architecture #detection #monitoring #named
- Archie: a tool for detecting, monitoring, and preserving architecturally significant code (MM, AF, AG, MW, JCH), pp. 739–742.
- LICS-CSL-2014-BenediktCB #effectiveness #logic
- Effective interpolation and preservation in guarded logics (MB, BtC, MVB), p. 10.
- LICS-CSL-2014-HarwathHS #bound #composition #theorem
- Preservation and decomposition theorems for bounded degree structures (FH, LH, NS), p. 10.
- LICS-CSL-2014-LiangFS #composition #concurrent #refinement #source code #verification
- Compositional verification of termination-preserving refinement of concurrent programs (HL, XF, ZS), p. 10.
- ASE-2013-KehrerKT #version control
- Consistency-preserving edit scripts in model versioning (TK, UK, GT), pp. 191–201.
- ASE-2013-Mirakhorli #architecture #implementation #visualisation
- Preventing erosion of architectural tactics through their strategic implementation, preservation, and visualization (MM), pp. 762–765.
- DATE-2013-YuehCM #architecture #quality
- Perceptual quality preserving SRAM architecture for color motion pictures (WY, MC, SM), pp. 103–108.
- DocEng-2013-HoverM
- Interchanging and preserving presentation recordings (KMH, MM), pp. 277–280.
- ICDAR-2013-ZaraiLDW
- Integrating Copies Obtained from Old and New Preservation Efforts (YZ, TL, ND, LW), pp. 47–51.
- SIGMOD-2013-BonomiXL #integration #named #privacy
- LinkIT: privacy preserving record linkage and integration via transformations (LB, LX, JJL), pp. 1029–1032.
- SIGMOD-2013-LinK #estimation #privacy #statistics
- Information preservation in statistical privacy and bayesian estimation of unattributed histograms (BRL, DK), pp. 677–688.
- VLDB-2013-LongWGJ
- Direction-Preserving Trajectory Simplification (CL, RCWW, HVJ), pp. 949–960.
- VLDB-2013-ZhangWYMC #integration #lightweight #peer-to-peer #privacy
- Lightweight Privacy-Preserving Peer-to-Peer Data Integration (YZ, WKW, SMY, NM, DWC), pp. 157–168.
- TACAS-2013-ChristHN #proving
- Proof Tree Preserving Interpolation (JC, JH, AN), pp. 124–138.
- TACAS-2013-WijsE #performance
- Efficient Property Preservation Checking of Model Refinements (AW, LE), pp. 565–579.
- DLT-J-2012-LehtinenO13 #context-free grammar #morphism
- Homomorphisms Preserving Deterministic Context-Free Languages (TL, AO), pp. 1049–1066.
- DLT-2013-Shur #anti #finite #order
- Languages with a Finite Antidictionary: Growth-Preserving Transformations and Available Orders of Growth (AMS), pp. 445–457.
- ICALP-v1-2013-BravermanRWY
- Direct Product via Round-Preserving Compression (MB, AR, OW, AY), pp. 232–243.
- CHI-2013-CafaroPLRR #exclamation #interactive
- I see you there!: developing identity-preserving embodied interaction for museum exhibits (FC, AP, LL, JR, JR), pp. 1911–1920.
- CHI-2013-FlatlaRGG13a #automation #named
- SPRWeb: preserving subjective responses to website colour schemes through automatic recolouring (DRF, KR, CG, KZG), pp. 2069–2078.
- CAiSE-2013-BarhamgiBOCCMT #execution #privacy
- Secure and Privacy-Preserving Execution Model for Data Services (MB, DB, SO, NCB, FC, MM, HT), pp. 35–50.
- CIKM-2013-TianCZ #approach #database #hybrid #mobile #privacy #query
- A hybrid approach for privacy-preserving processing of knn queries in mobile database systems (ST, YC, QZ), pp. 1161–1164.
- ICML-c3-2013-HwangGS #categorisation #semantics #visual notation
- Analogy-preserving Semantic Embedding for Visual Object Categorization (SJH, KG, FS), pp. 639–647.
- ICML-c3-2013-KimS #approximate #modelling #topic
- Manifold Preserving Hierarchical Topic Models for Quantization and Approximation (MK, PS), pp. 1373–1381.
- KDD-2013-JohnsonS #data analysis #privacy
- Privacy-preserving data exploration in genome-wide association studies (AJ, VS), pp. 1079–1087.
- KDD-2013-WuNTWXX #framework #privacy
- A privacy preserving framework for managing vehicle data in road pricing systems (HW, WSN, KLT, WW, SX, MX), pp. 1427–1435.
- KDIR-KMIS-2013-BachmannNMBAC #information management #process #safety
- Preservation and Redeployment of Sensor Acquisition Processes from a Dam Safety Information System (AB, MAN, HM, JB, GA, AC), pp. 490–495.
- SIGIR-2013-MoranLO
- Neighbourhood preserving quantisation for LSH (SM, VL, MO), pp. 1009–1012.
- QAPL-2013-GazeauMP #difference #privacy #semantics
- Preserving differential privacy under finite-precision semantics (IG, DM, CP), pp. 1–18.
- SAC-PL-J-2010-RodriguesNPM13 #semantics
- Preserving the original MPI semantics in a virtualized processor environment (ERR, POAN, JP, CLM), pp. 412–421.
- ASPLOS-2013-WangW #hardware #named #optimisation #performance
- TSO_ATOMICITY: efficient hardware primitive for TSO-preserving region optimizations (CW, YW), pp. 509–520.
- CAV-2013-CernyHRRT #concurrent #performance #semantics #synthesis
- Efficient Synthesis for Concurrency by Semantics-Preserving Transformations (PC, TAH, AR, LR, TT), pp. 951–967.
- ASE-2012-Yamamoto #refinement
- Property-preserving program refinement (YY), pp. 398–401.
- DAC-2012-ShojaeiDR #integer #programming
- Confidentiality preserving integer programming for global routing (HS, AD, PR), pp. 709–716.
- SIGMOD-2012-FanLWW #graph #query
- Query preserving graph compression (WF, JL, XW, YW), pp. 157–168.
- SIGMOD-2012-MohanTSSC #data analysis #named #privacy
- GUPT: privacy preserving data analysis made easy (PM, AT, ES, DS, DEC), pp. 349–360.
- VLDB-2012-AgrawalAW #in the cloud #perspective #privacy
- Secure and Privacy-Preserving Data Services in the Cloud: A Data Centric View (DA, AEA, SW), pp. 2028–2029.
- VLDB-2012-TerrovitisLMS #privacy
- Privacy Preservation by Disassociation (MT, JL, NM, SS), pp. 944–955.
- CSMR-2012-BarateiroDNS #challenge #lifecycle
- Digital Preservation Challenges on Software Life Cycle (JB, DD, MAN, SS), pp. 487–490.
- ICSM-2012-OuniKSH #refactoring #search-based #semantics #towards
- Search-based refactoring: Towards semantics preservation (AO, MK, HAS, MSH), pp. 347–356.
- DLT-2012-LehtinenO #context-free grammar #morphism
- Homomorphisms Preserving Deterministic Context-Free Languages (TL, AO), pp. 154–165.
- ICALP-v1-2012-FellowsKRS #approximate
- Parameterized Approximation via Fidelity Preserving Transformations (MRF, AK, FAR, HS), pp. 351–362.
- ICALP-v1-2012-KrauthgamerZ #using
- Preserving Terminal Distances Using Minors (RK, TZ), pp. 594–605.
- IFM-2012-DiaconescuLPSS #interactive
- Refinement-Preserving Translation from Event-B to Register-Voice Interactive Systems (DD, IL, LP, KS, GS), pp. 221–236.
- ICGT-2012-AnjorinST #graph grammar
- Construction of Integrity Preserving Triple Graph Grammars (AA, AS, GT), pp. 356–370.
- ICGT-2012-GieseL #automation #behaviour #invariant #model transformation #towards #verification
- Towards Automatic Verification of Behavior Preservation for Model Transformation via Invariant Checking (HG, LL), pp. 249–263.
- ICEIS-J-2012-BanosBM #challenge #paradigm
- Blog Preservation: Current Challenges and a New Paradigm (VB, NB, YM), pp. 29–51.
- ICEIS-v1-2012-Manolopoulos #roadmap
- Trends in Blog Preservation (VB, NB, YM).
- CIKM-2012-BonomiXCF #privacy
- Frequent grams based embedding for privacy preserving record linkage (LB, LX, RC, BCMF), pp. 1597–1601.
- CIKM-2012-ChenLTH
- Information preservation in static index pruning (RCC, CJL, CMT, JH), pp. 2487–2490.
- CIKM-2012-VlachosWS #clustering
- Right-protected data publishing with hierarchical clustering preservation (MV, AW, JS), pp. 654–663.
- CIKM-2012-YaoC #locality #matrix
- Accelerating locality preserving nonnegative matrix factorization (GY, DC), pp. 2271–2274.
- ICML-2012-ShiSHH #question #random
- Is margin preserved after random projection? (QS, CS, RH, AvdH), p. 86.
- ICPR-2012-BaoSYA #framework
- An edge-preserving filtering framework for visibility restoration (LB, YS, QY, NA), pp. 384–387.
- ICPR-2012-CarliniF
- A Semi-Lagrangian scheme for area preserving flows (EC, RF), pp. 2029–2033.
- ICPR-2012-DasR #documentation #image #novel #quality
- A novel scheme of orientation and scale mapped RDC (OS-RDC) to improve compression in document images ensuring quality preservation (AD, RR), pp. 641–644.
- GPCE-2012-AxelsenK #java #performance #semantics #text-to-text
- Package templates: a definition by semantics-preserving source-to-source transformations to efficient Java code (EWA, SK), pp. 50–59.
- SAC-2012-BasuVDK #case study #collaboration #performance #privacy
- Feasibility of a privacy preserving collaborative filtering scheme on the Google App Engine: a performance case study (AB, JV, TD, HK), pp. 447–452.
- LDTA-2012-JongeV #refactoring
- A language generic solution for name binding preservation in refactorings (MdJ, EV), p. 2.
- ICLP-2012-NovelliVPD #architecture #named
- LOG-IDEAH: ASP for Architectonic Asset Preservation (VN, MDV, JAP, DD), pp. 393–403.
- ICST-2012-TranP #framework #graph transformation #towards #verification
- Towards a Rule-Level Verification Framework for Property-Preserving Graph Transformations (HNT, CP), pp. 946–953.
- LICS-2012-ChenM #algebra #category theory #constraints #quantifier #theorem
- An Algebraic Preservation Theorem for Aleph-Zero Categorical Quantified Constraint Satisfaction (HC, MM), pp. 215–224.
- DATE-2011-NejadMG #quality
- An FPGA bridge preserving traffic quality of service for on-chip network-based systems (ABN, MEM, KG), pp. 425–430.
- ICDAR-2011-DuL #identification #privacy
- Preservative License Plate De-identification for Privacy Protection (LD, HL), pp. 468–472.
- ICDAR-2011-YamazoeEYT #approach #finite #recognition #transducer
- Hypothesis Preservation Approach to Scene Text Recognition with Weighted Finite-State Transducer (TY, ME, TY, KT), pp. 359–363.
- PODS-2011-AntonopoulosMN #complexity #xml
- The complexity of text-preserving XML transformations (TA, WM, FN), pp. 247–258.
- PODS-2011-HeBWN #complexity #on the #privacy
- On the complexity of privacy-preserving complex event processing (YH, SB, DW, JFN), pp. 165–174.
- VLDB-2011-SrinivasanB #named #realtime
- Citrusleaf: A Real-Time NoSQL DB which Preserves ACID (VS, BB), pp. 1340–1350.
- ICSM-2011-MihaliczaPG #c++ #profiling
- Type-preserving heap profiler for C++ (JM, ZP, AG), pp. 457–466.
- PLDI-2011-BudiLJL #behaviour #debugging #named
- kb-anonymity: a model for anonymized behaviour-preserving test and debugging data (AB, DL, LJ, L), pp. 447–457.
- PLDI-2011-MarinoSMMN #compilation
- A case for an SC-preserving compiler (DM, AS, TDM, MM, SN), pp. 199–210.
- STOC-2011-Smith #convergence #estimation #privacy #statistics
- Privacy-preserving statistical estimation with optimal convergence rates (AS), pp. 813–822.
- AFL-2011-Blanchet-SadriNT #on the #word
- On Operations Preserving Primitivity of Partial Words with One Hole (FBS, SN, AT), pp. 93–107.
- ICALP-v2-2011-GoodrichM #outsourcing #privacy #ram #simulation
- Privacy-Preserving Access of Outsourced Data via Oblivious RAM Simulation (MTG, MM), pp. 576–587.
- ICALP-v2-2011-GotsmanY #abstraction
- Liveness-Preserving Atomicity Abstraction (AG, HY), pp. 453–465.
- ICFP-2011-AhmedB #continuation #multi #semantics
- An equivalence-preserving CPS translation via multi-language semantics (AA, MB), pp. 431–444.
- HIMI-v1-2011-NasozBPR #metadata
- A User-Centric Metadata Creation Tool for Preserving the Nation’s Ecological Data (FN, RCB, CJP, DJR), pp. 122–131.
- HIMI-v2-2011-UesakaIY #visual notation
- A Digital Archive System for Preserving Audio and Visual Space (MU, YI, TY), pp. 103–110.
- CIKM-2011-BanerjeeC #distributed #feature model #privacy #using
- Privacy preserving feature selection for distributed data using virtual dimension (MB, SC), pp. 2281–2284.
- CIKM-2011-GevaV #documentation #named
- TOPSIG: topology preserving document signatures (SG, CMDV), pp. 333–338.
- CIKM-2011-HsuC #analysis #component #independence #privacy
- Privacy preservation by independent component analysis and variance control (CMH, MSC), pp. 925–930.
- CIKM-2011-LiLSG #community #named #online #performance #privacy #recommendation #social
- YANA: an efficient privacy-preserving recommender system for online social communities (DL, QL, LS, NG), pp. 2269–2272.
- CIKM-2011-TangWLMP #network #privacy
- Privacy preserving indexing for eHealth information networks (YT, TW, LL, SM, BP), pp. 905–914.
- ICML-2011-BuffoniCGU #learning #standard
- Learning Scoring Functions with Order-Preserving Losses and Standardized Supervision (DB, CC, PG, NU), pp. 825–832.
- ICML-2011-QuadriantoL #learning #multi
- Learning Multi-View Neighborhood Preserving Projections (NQ, CHL), pp. 425–432.
- ICML-2011-ShiehHA
- Tree preserving embedding (AS, TH, EA), pp. 753–760.
- ICML-2011-VattaniCG #personalisation #rank
- Preserving Personalized Pagerank in Subgraphs (AV, DC, MG), pp. 793–800.
- KDD-2011-TaiYYC #network #privacy #social
- Privacy-preserving social network publication against friendship attacks (CHT, PSY, DNY, MSC), pp. 1262–1270.
- KEOD-2011-AkamaN
- Meaning-preserving Skolemization (KA, EN), pp. 322–327.
- KMIS-2011-SaharkhizS #multi #network #privacy #social
- A Method for Preserving Privacy in Published Multi-relational Social Networks (AS, HRS), pp. 341–346.
- ICMT-2011-BeckerLDBG #development #refactoring #rule-based
- Iterative Development of Consistency-Preserving Rule-Based Refactorings (BB, LL, JD, SB, HG), pp. 123–137.
- SAC-2011-AhluwaliaGCY #mining #privacy
- Target-based privacy preserving association rule mining (MA, AG, ZC, YY), pp. 962–967.
- SAC-2011-RayNDF #interactive #privacy #verification
- Verification of data pattern for interactive privacy preservation model (SR, MFN, SD, BCMF), pp. 1716–1723.
- SLE-2011-JongeV #algorithm #layout #refactoring
- An Algorithm for Layout Preservation in Refactoring Transformations (MdJ, EV), pp. 40–59.
- SPLC-2011-HutchessonM #effectiveness #product line #towards
- Towards Cost-Effective High-Assurance Software Product Lines: The Need for Property-Preserving Transformations (SH, JAM), pp. 55–64.
- RTA-2011-AotoT #confluence #proving #term rewriting
- A Reduction-Preserving Completion for Proving Confluence of Non-Terminating Term Rewriting Systems (TA, YT), pp. 91–106.
- RTA-2011-DurandS #bound #linear
- Left-linear Bounded TRSs are Inverse Recognizability Preserving (ID, MS), pp. 361–376.
- RTA-2011-StumpKO #confluence #problem
- Type Preservation as a Confluence Problem (AS, GK, REHO), pp. 345–360.
- DATE-2010-El-MoselhyD #order #reduction #statistics #using
- Variation-aware interconnect extraction using statistical moment preserving model order reduction (TAEM, LD), pp. 453–458.
- HT-2010-CartledgeN #analysis #graph
- Analysis of graphs for digital preservation suitability (CLC, MLN), pp. 109–118.
- SIGMOD-2010-ChengFL #morphism #named #network #privacy
- K-isomorphism: privacy preserving network publication against structural attacks (JC, AWCF, JL), pp. 459–470.
- SIGMOD-2010-ElmeleegyOEA #integration #peer-to-peer #privacy
- Preserving privacy and fairness in peer-to-peer data integration (HE, MO, AKE, AMA), pp. 759–770.
- SIGMOD-2010-NabeelSZB #named #privacy
- Mask: a system for privacy-preserving policy-based access to published content (MN, NS, JZ, EB), pp. 1239–1242.
- SIGMOD-2010-WongMC #privacy
- Non-homogeneous generalization in privacy preserving data publishing (WKW, NM, DWLC), pp. 747–758.
- FASE-2010-JacksonSBK #model transformation #reuse
- Reusing Model Transformations While Preserving Properties (EKJ, WS, DB, GK), pp. 44–58.
- PLDI-2010-ChenCS #compilation #security #verification
- Type-preserving compilation of end-to-end verification of security enforcement (JC, RC, NS), pp. 412–423.
- IFM-2010-HulsbuschKRSSW #comparison #model transformation #semantics
- Showing Full Semantics Preservation in Model Transformation — A Comparison of Techniques (MH, BK, AR, MS, CS, HW), pp. 183–198.
- GT-VMT-2010-BottoniFP #constraints #model transformation
- Preserving constraints in horizontal model transformations (PB, AF, FPP).
- ICGT-2010-Khomenko #behaviour
- A New Type of Behaviour-Preserving Transition Insertions in Unfolding Prefixes (VK), pp. 75–90.
- CHI-2010-WilliamsonRSMJB #privacy #social
- Social gravity: a virtual elastic tether for casual, privacy-preserving pedestrian rendezvous (JW, SR, CDS, RMS, MJ, SAB), pp. 1485–1494.
- AdaEurope-2010-MezzettiPV #ada
- Preservation of Timing Properties with the Ada Ravenscar Profile (EM, MP, TV), pp. 153–166.
- CIKM-2010-FreniVMBJ #network #privacy
- Preserving location and absence privacy in geo-social networks (DF, CRV, SM, CB, CSJ), pp. 309–318.
- CIKM-2010-ShangCSCH #towards
- (k, P)-anonymity: towards pattern-preserving anonymity of time-series data (XS, KC, LS, GC, TH), pp. 1333–1336.
- ICPR-2010-BouboulisTS #image #kernel
- Edge Preserving Image Denoising in Reproducing Kernel Hilbert Spaces (PB, ST, KS), pp. 2660–2663.
- ICPR-2010-Giachetti #image
- Irradiance Preserving Image Interpolation (AG), pp. 2218–2221.
- ICPR-2010-GrazziniS #image
- Iterative Ramp Sharpening for Structure/Signature-Preserving Simplification of Images (JG, PS), pp. 4585–4588.
- ICPR-2010-HuiWX #linear
- Globally-Preserving Based Locally Linear Embedding (KH, CW, BX), pp. 531–534.
- ICPR-2010-TakahashiK #approximate #classification
- Margin Preserved Approximate Convex Hulls for Classification (TT, MK), pp. 4052–4055.
- ICPR-2010-YangGG #analysis #locality #recognition
- Extended Locality Preserving Discriminant Analysis for Face Recognition (LY, WG, XG), pp. 539–542.
- ICPR-2010-ZhanY #clustering
- Cluster Preserving Embedding (YZ, JY), pp. 621–624.
- KDD-2010-FangNF
- Discovering significant relaxed order-preserving submatrices (QF, WN, JF), pp. 433–442.
- KDD-2010-JinZZD #privacy
- Versatile publishing for privacy preservation (XJ, MZ, NZ, GD), pp. 353–362.
- KDD-2010-LinC #outsourcing #privacy #random
- Privacy-preserving outsourcing support vector machines with random transformation (KPL, MSC), pp. 363–372.
- KDD-2010-YangNSS #data mining #mining #privacy
- Collusion-resistant privacy-preserving data mining (BY, HN, IS, JS), pp. 483–492.
- KEOD-2010-Brunsmann #collaboration #design #ontology #semantics #social
- The Design of a Social Semantic Search Engine — Preserving Archived Collaborative Engineering Knowledge with Ontology Matching (JB), pp. 200–205.
- KMIS-2010-KadhemAK #database #encryption #order #performance #relational
- A Secure and Efficient Order Preserving Encryption Scheme for Relational Databases (HK, TA, HK), pp. 25–35.
- RecSys-2010-BaglioniBBCFVP #lightweight #mobile #privacy #recommendation
- A lightweight privacy preserving SMS-based recommendation system for mobile users (EB, LB, LB, UMC, LF, AV, GP), pp. 191–198.
- PPDP-2010-Martinez #concurrent #constraints #linear #programming #semantics
- Semantics-preserving translations between linear concurrent constraint programming and constraint handling rules (TM), pp. 57–66.
- SAC-2010-ChakrabartiCGM #analysis #linear #privacy
- Privacy preserving linear discriminant analysis from perturbed data (SC, ZC, AG, SM), pp. 610–615.
- SAC-2010-CuzzocreaB #distributed #framework #multi #privacy #xml
- A secure multiparty computation privacy preserving OLAP framework over distributed XML data (AC, EB), pp. 1666–1673.
- SAC-2010-DAngeloVZ #privacy #web
- Content cloaking: preserving privacy with Google Docs and other web applications (GD, FV, SZ), pp. 826–830.
- ICSE-2010-SteimannT #behaviour #constraints #generative
- From behaviour preservation to behaviour modification: constraint-based mutant generation (FS, AT), pp. 425–434.
- CSL-2010-SternagelT #dependence #proving #termination
- Signature Extensions Preserve Termination — An Alternative Proof via Dependency Pairs (CS, RT), pp. 514–528.
- DATE-2009-BaumgartnerM #liveness #scalability
- Scalable liveness checking via property-preserving transformations (JB, HM), pp. 1680–1685.
- SIGMOD-2009-BinnigHF #in memory #memory management #string
- Dictionary-based order-preserving string compression for main memory column stores (CB, SH, FF), pp. 283–296.
- SIGMOD-2009-DasguptaZDC #database #how #privacy #question #why
- Privacy preservation of aggregates in hidden databases: why and how? (AD, NZ, GD, SC), pp. 153–164.
- SIGMOD-2009-McSherry #data analysis #framework #privacy #query
- Privacy integrated queries: an extensible platform for privacy-preserving data analysis (FM), pp. 19–30.
- VLDB-2009-ZouCO09a #framework #morphism #named #network #privacy
- K-Automorphism: A General Framework For Privacy Preserving Network Publication (LZ, LC, MTÖ), pp. 946–957.
- ICALP-v1-2009-ChekuriK #graph #reduction
- A Graph Reduction Step Preserving Element-Connectivity and Applications (CC, NK), pp. 254–265.
- LATA-2009-PardubskaPO #automaton #communication #correctness #on the #parallel
- On Parallel Communicating Grammar Systems and Correctness Preserving Restarting Automata (DP, MP, FO), pp. 660–671.
- FM-2009-Eshuis #petri net
- Translating Safe Petri Nets to Statecharts in a Structure-Preserving Way (RE), pp. 239–255.
- GT-VMT-2009-MazanekM #diagrams #editing #generative
- Generating Correctness-Preserving Editing Operations for Diagram Editors (SM, MM), pp. 38–49.
- CHI-2009-OdomPSB #comprehension #design #interactive #why
- Understanding why we preserve some things and discard others in the context of interaction design (WO, JP, ES, EB), pp. 1053–1062.
- ICEIS-ISAS-2009-OhmoriK #approach #development #enterprise #invariant
- Enterprise System Development with Invariant Preserving — A Mathematical Approach by the Homotopy Lifting and Extension Properties (KO, TLK), pp. 116–123.
- CIKM-2009-ZhuCZWWC #algorithm #ranking
- A general magnitude-preserving boosting algorithm for search ranking (CZ, WC, ZAZ, GW, DW, ZC), pp. 817–826.
- ICML-2009-ShawJ
- Structure preserving embedding (BS, TJ), pp. 937–944.
- KDIR-2009-Zhan #collaboration #data mining #mining #privacy
- Privacy-Preserving Collaborative Data Mining (JZ), p. 15.
- KEOD-2009-Zhan #collaboration #data mining #mining #privacy
- Privacy-Preserving Collaborative Data Mining (JZ), p. 15.
- KMIS-2009-Zhan #collaboration #data mining #mining #privacy
- Privacy-Preserving Collaborative Data Mining (JZ), p. 15.
- MLDM-2009-ZhuFF #classification #privacy
- Preserving Privacy in Time Series Data Classification by Discretization (YZ, YF, HF), pp. 53–67.
- RecSys-2009-ShokriPTH #collaboration #distributed #privacy
- Preserving privacy in collaborative filtering through distributed aggregation of offline profiles (RS, PP, GT, JPH), pp. 157–164.
- SEKE-2009-ChaoS #clustering #data type #privacy
- Privacy-preserving Clustering of Data Streams (CMC, CCS), pp. 530–535.
- SAC-2009-BeckerR #evaluation #modelling #off the shelf #requirements
- Requirements modelling and evaluation for digital preservation: a COTS selection method based on controlled experimentation (CB, AR), pp. 401–402.
- SAC-2009-PereiraTLP #network
- Preservation of ordering in a network of brokers (CMMP, CACT, DCL, MdGCP), pp. 88–89.
- SAC-2009-Vaidya #linear #privacy #programming
- Privacy-preserving linear programming (JV), pp. 2002–2007.
- SAC-2009-XuLQ #predict #privacy
- Privacy preserving churn prediction (SX, SL, MQ), pp. 1610–1614.
- ICSE-2009-CasoBGU #abstraction #contract #finite #using #validation
- Validation of contracts using enabledness preserving finite state abstractions (GdC, VAB, DG, SU), pp. 452–462.
- DATE-2008-VillenaS #algorithm #named #order #reduction #scalability
- SPARE — a Scalable algorithm for passive, structure preserving, Parameter-Aware model order REduction (JFV, LMS), pp. 586–591.
- SIGMOD-2008-ChowMH #monitoring #named #network #privacy
- Tinycasper: a privacy-preserving aggregate location monitoring system in wireless sensor networks (CYC, MFM, TH), pp. 1307–1310.
- SIGMOD-2008-LiTX #privacy #proximity
- Preservation of proximity privacy in publishing numerical sensitive data (JL, YT, XX), pp. 473–486.
- SIGMOD-2008-XiaoT #analysis #privacy #statistics
- Dynamic anonymization: accurate statistical analysis with privacy preservation (XX, YT), pp. 107–120.
- VLDB-2008-BuFWCL #composition #privacy
- Privacy preserving serial data publishing by role composition (YB, AWCF, RCWW, LC, JL), pp. 845–856.
- VLDB-2008-TerrovitisMK #privacy
- Privacy-preserving anonymization of set-valued data (MT, NM, PK), pp. 115–125.
- VLDB-2008-ZerrN #distributed #documentation #framework #privacy
- Privacy preserving document indexing infrastructure for a distributed environment (SZ, WN), pp. 1638–1643.
- FASE-2008-AalstDGHRM #modelling #process
- Correctness-Preserving Configuration of Business Process Models (WMPvdA, MD, FG, AHMtH, MLR, JM), pp. 46–61.
- FoSSaCS-2008-GodoyMT #decidability #morphism
- Classes of Tree Homomorphisms with Decidable Preservation of Regularity (GG, SM, ST), pp. 127–141.
- PEPM-2008-DjokoDF #aspect-oriented
- Aspects preserving properties (SDD, RD, PF), pp. 135–145.
- PLDI-2008-ChenHPECCP #compilation #object-oriented #optimisation #scalability
- Type-preserving compilation for large-scale optimizing object-oriented compilers (JC, CH, FP, ME, JC, DC, PP), pp. 183–192.
- AFL-2008-JurgensenM #morphism
- Homomorphisms Preserving Types of Density (HJ, IM), pp. 183–194.
- ICALP-B-2008-GomezGP #commutative #question
- When Does Partial Commutative Closure Preserve Regularity? (ACG, GG, JÉP), pp. 209–220.
- LATA-2008-Becker #self
- Transformations and Preservation of Self-assembly Dynamics through Homotheties (FB), pp. 101–112.
- LATA-2008-Leupold #on the #string #term rewriting
- On Regularity-Preservation by String-Rewriting Systems (PL), pp. 345–356.
- SEFM-2008-BartheKPS #hybrid #proving #verification
- Preservation of Proof Pbligations for Hybrid Verification Methods (GB, CK, DP, JSF), pp. 127–136.
- SEFM-2008-DjokoDF #aspect-oriented
- Specialized Aspect Languages Preserving Classes of Properties (SDD, RD, PF), pp. 227–236.
- ICFP-2008-AhmedB #equivalence
- Typed closure conversion preserves observational equivalence (AA, MB), pp. 157–168.
- ICFP-2008-GuillemetteM #compilation #haskell
- A type-preserving compiler in Haskell (LJG, SM), pp. 75–86.
- IFL-2008-BrasselF #functional #lazy evaluation #logic programming #source code
- From Functional Logic Programs to Purely Functional Programs Preserving Laziness (BB, SF), pp. 25–42.
- GT-VC-2007-ErmelE08 #animation #behaviour
- Behavior-Preserving Simulation-to-Animation Model and Rule Transformations (CE, HE), pp. 55–74.
- ICGT-2008-RangelLKEB #behaviour #refactoring #using
- Behavior Preservation in Model Refactoring Using DPO Transformations with Borrowed Contexts (GR, LL, BK, HE, PB), pp. 242–256.
- CIKM-2008-JurczykX #database #privacy
- Privacy-preserving data publishing for horizontally partitioned databases (PJ, LX), pp. 1321–1322.
- ICML-2008-SakumaKW #learning #privacy
- Privacy-preserving reinforcement learning (JS, SK, RNW), pp. 864–871.
- ICPR-2008-NguyenLV #2d #locality
- Ridge Regression for Two Dimensional Locality Preserving Projection (NTN, WL, SV), pp. 1–4.
- ICPR-2008-OhyamaNYN
- Reversible data hiding of full color JPEG2000 compressed bit-stream preserving bit-depth information (SO, MN, KY, HN), pp. 1–4.
- ICPR-2008-SubrahmanyamRAR #reduction
- Edge-preserving unscented Kalman filter for speckle reduction (GRKSS, ANR, RA, GR), pp. 1–4.
- ICPR-2008-WatanabeK #locality #multi
- Locality preserving multi-nominal logistic regression (KW, TK), pp. 1–4.
- KDD-2008-YuFRKRDL #analysis #privacy
- Privacy-preserving cox regression for survival analysis (SY, GF, RR, SK, RBR, CDO, PL), pp. 1034–1042.
- SEKE-2008-Chao #classification #data type #privacy
- Privacy-preserving Classification of Data Streams (CMC), pp. 603–606.
- SIGIR-2008-NieD #topic
- Separate and inequal: preserving heterogeneity in topical authority flows (LN, BDD), pp. 443–450.
- ECMDA-FA-2008-EngelsKRSSW #behaviour #model transformation #process #towards #uml
- From UML Activities to TAAL — Towards Behaviour-Preserving Model Transformations (GE, AK, AR, MS, CS, HW), pp. 94–109.
- ECMDA-FA-2008-OldevikH #aspect-oriented #diagrams #semantics #sequence chart
- Semantics Preservation of Sequence Diagram Aspects (JO, ØH), pp. 215–230.
- ECOOP-2008-ArtziKE #named
- ReCrash: Making Software Failures Reproducible by Preserving Object States (SA, SK, MDE), pp. 542–565.
- SAC-2008-BeckerRHST #xml
- A generic XML language for characterising objects to support digital preservation (CB, AR, VH, JS, MT), pp. 402–406.
- SAC-2008-DingMH #approach #refinement #specification #using
- An approach for specification construction using property-preserving refinement patterns (JD, LM, XH), pp. 797–803.
- SAC-2008-GrovPMI #component #concurrent #coordination
- Preserving coordination properties when transforming concurrent system components (GG, RFP, GM, AI), pp. 126–127.
- SAC-2008-HeSVA #privacy
- Privacy-preserving link discovery (XH, BS, JV, NRA), pp. 909–915.
- SAC-2008-HuangKV #challenge #privacy
- Privacy preservation services: challenges and solutions (DH, VK, MV), pp. 2110–2115.
- IJCAR-2008-BartheGP #java #proving #virtual machine
- Preservation of Proof Obligations from Java to the Java Virtual Machine (GB, BG, MP), pp. 83–99.
- LICS-2008-Duris #theorem
- Hypergraph Acyclicity and Extension Preservation Theorems (DD), pp. 418–427.
- DocEng-2007-ChaoGW #scalability
- Preserving the aesthetics during non-fixed aspect ratio scaling of the digital border (HC, PG, AW), pp. 144–146.
- DocEng-2007-TriebseesB #automation #documentation #embedded #migration #query #semantics #towards
- Towards automatic document migration: semantic preservation of embedded queries (TT, UMB), pp. 209–218.
- SIGMOD-2007-ScannapiecoFBE #privacy
- Privacy preserving schema and data matching (MS, IF, EB, AKE), pp. 653–664.
- SIGMOD-2007-XiaoT #dataset #named #privacy #towards
- M-invariance: towards privacy preserving re-publication of dynamic datasets (XX, YT), pp. 689–700.
- VLDB-2007-WongFWP #privacy
- Minimality Attack in Privacy Preserving Data Publishing (RCWW, AWCF, KW, JP), pp. 543–554.
- FASE-2007-EhrigEEHT #bidirectional #model transformation
- Information Preserving Bidirectional Model Transformations (HE, KE, CE, FH, GT), pp. 72–86.
- PLDI-2007-Chlipala #assembly #compilation #λ-calculus
- A certified type-preserving compiler from λ calculus to assembly language (AC), pp. 54–65.
- CIAA-2007-Volkov #automaton #partial order
- Synchronizing Automata Preserving a Chain of Partial Orders (MVV), pp. 27–37.
- DHM-2007-ZhaoL #3d #image #locality #orthogonal #using
- Capturing 3D Human Motion from Monocular Images Using Orthogonal Locality Preserving Projection (XZ, YL), pp. 304–313.
- EDOC-2007-Kerschbaum #benchmark #enterprise #metric #privacy
- Building a Privacy-Preserving Benchmarking Enterprise System (FK), pp. 87–96.
- CIKM-2007-CaiHZH #locality
- Regularized locality preserving indexing via spectral regression (DC, XH, WVZ, JH), pp. 741–750.
- ICML-2007-CortesMR #algorithm #ranking
- Magnitude-preserving ranking algorithms (CC, MM, AR), pp. 169–176.
- KDD-2007-WanNHL #privacy
- Privacy-preservation for gradient descent methods (LW, WKN, SH, VCSL), pp. 775–783.
- MLDM-2007-TanN #data mining #mining #privacy #probability #re-engineering
- Generic Probability Density Function Reconstruction for Randomization in Privacy-Preserving Data Mining (VYFT, SKN), pp. 76–90.
- RecSys-2007-BerkovskyEKR #collaboration #distributed #privacy
- Enhancing privacy and preserving accuracy of a distributed collaborative filtering (SB, YE, TK, FR), pp. 9–16.
- SIGIR-2007-SchuldtGOH #on the #retrieval
- On the importance of preserving the part-order in shape retrieval (AS, BG, OO, OH), pp. 771–772.
- LOPSTR-2007-FischerSTV #functional #lazy evaluation #partial evaluation #source code
- Preserving Sharing in the Partial Evaluation of Lazy Functional Programs (SF, JS, ST, GV), pp. 74–89.
- SAC-2007-LinL #mining #privacy #transaction
- Privacy preserving itemset mining through fake transactions (JLL, JYCL), pp. 375–379.
- SAC-2007-LongoG #protocol
- A protocol to preserve a code of conduct (CL, PG), pp. 1579–1585.
- LICS-2007-RabinST #correctness #performance #proving
- Highly Efficient Secrecy-Preserving Proofs of Correctness of Computations and Applications (MOR, RAS, CT), pp. 63–76.
- RTA-2007-DurandS #bottom-up
- Bottom-Up Rewriting Is Inverse Recognizability Preserving (ID, GS), pp. 107–121.
- CASE-2006-KwokHLF #image #multi #optimisation #using
- Intensity-Preserving Contrast Enhancement for Gray-Level Images using Multi-objective Particle Swarm Optimization (NMK, QPH, DL, GF), pp. 21–26.
- DAC-2006-WongC #matrix #performance
- A fast passivity test for descriptor systems via structure-preserving transformations of Skew-Hamiltonian/Hamiltonian matrix pencils (NW, CKC), pp. 261–266.
- DAC-2006-YuSH #analysis #grid #order #performance #power management #reduction
- Fast analysis of structured power grid by triangularization based structure preserving model order reduction (HY, YS, LH), pp. 205–210.
- DocEng-2006-TriebseesB #constraints #documentation #migration
- Preservation-centric and constraint-based migration of digital documents (TT, UMB), pp. 59–61.
- PODS-2006-KolahiL #dependence #normalisation #on the
- On redundancy vs dependency preservation in normalization: an information-theoretic study of 3NF (SK, LL), pp. 114–123.
- SIGMOD-2006-XiaoT #personalisation #privacy
- Personalized privacy preservation (XX, YT), pp. 229–240.
- VLDB-2006-XiaoT #effectiveness #named #privacy
- Anatomy: Simple and Effective Privacy Preservation (XX, YT), pp. 139–150.
- PLDI-2006-VechevYB #algorithm #concurrent #garbage collection
- Correctness-preserving derivation of concurrent garbage collection algorithms (MTV, EY, DFB), pp. 341–353.
- CIAA-2006-Maletti #question
- Does o-Substitution Preserve Recognizability? (AM), pp. 150–161.
- CIAA-2006-MesserschmidtMOP #complexity #correctness
- Correctness Preservation and Complexity of Simple RL-Automata (HM, FM, FO, MP), pp. 162–172.
- ICALP-v2-2006-AlurCZ #refinement
- Preserving Secrecy Under Refinement (RA, PC, SZ), pp. 107–118.
- ICFP-2006-DenielouL #abstraction #distributed #type system
- Abstraction preservation and subtyping in distributed languages (PMD, JJL), pp. 286–297.
- SOFTVIS-2006-Jucknath-JohnGT #development #layout #modelling
- Evolutionary layout: preserving the mental map during the development of class models (SJJ, DG, GT), pp. 165–166.
- CIKM-2006-CongFG
- Annotation propagation revisited for key preserving views (GC, WF, FG), pp. 632–641.
- CIKM-2006-KapoorPTT #database #distributed #mining #privacy
- Privacy preserving sequential pattern mining in distributed databases (VK, PP, FT, MT), pp. 758–767.
- CIKM-2006-VardeRRBMS #clustering #design #semantics
- Designing semantics-preserving cluster representatives for scientific input conditions (ASV, EAR, CR, DCB, MM, RDSJ), pp. 708–717.
- ICML-2006-LawrenceC #constraints #distance
- Local distance preservation in the GP-LVM through back constraints (NDL, JQC), pp. 513–520.
- ICPR-v2-2006-LahdenojaALP #parametricity #symmetry
- A Shape-Preserving Non-parametric Symmetry Transform (OL, EA, ML, AP), pp. 373–377.
- ICPR-v2-2006-MinS #estimation
- Edge-preserving Simultaneous Joint Motion-Disparity Estimation (DBM, KS), pp. 74–77.
- ICPR-v2-2006-ZhengL #analysis #component #kernel #learning #locality #problem
- Regularized Locality Preserving Learning of Pre-Image Problem in Kernel Principal Component Analysis (WSZ, JHL), pp. 456–459.
- ICPR-v3-2006-ArcelliBS #3d #set
- A New Set of Topology Preserving Removal Operations in the 3D Space (CA, GSdB, LS), pp. 1055–1058.
- ICPR-v3-2006-ChenY06a #adaptation #equation #image
- A new adaptive diffusion equation for image noise removal and feature preservation (SC, XY), pp. 885–888.
- ICPR-v3-2006-StelldingerL06b #3d #re-engineering
- 3D Object Digitization: Topology Preserving Reconstruction (PS, LJL), pp. 693–696.
- ICPR-v4-2006-YuC06a #segmentation #statistics #using
- Filament Preserving Segmentation for SAR Sea Ice Imagery Using a New Statistical Model (QY, DAC), pp. 849–852.
- KDD-2006-AggarwalPZ #data mining #mining #on the #privacy
- On privacy preservation against adversarial data mining (CCA, JP, BZ), pp. 510–516.
- KDD-2006-BrickellS #performance
- Efficient anonymity-preserving data collection (JB, VS), pp. 76–85.
- KDD-2006-WongLFW #privacy
- (alpha, k)-anonymity: an enhanced k-anonymity model for privacy preserving data publishing (RCWW, JL, AWCF, KW), pp. 754–759.
- SAC-2006-AimeurBFO #privacy
- Privacy-preserving demographic filtering (EA, GB, JMF, FSMO), pp. 872–878.
- SAC-2006-AtzoriBGP #towards
- Towards low-perturbation anonymity preserving pattern discovery (MA, FB, FG, DP), pp. 588–592.
- SAC-2006-BaragliaLOSS #privacy #recommendation #web
- A privacy preserving web recommender system (RB, CL, SO, MS, FS), pp. 559–563.
- SAC-2006-GuoW #data mining #mining #on the #privacy
- On the use of spectral filtering for privacy preserving data mining (SG, XW), pp. 622–626.
- SAC-2006-YuJV #kernel #privacy #using
- Privacy-preserving SVM using nonlinear kernels on horizontally partitioned data (HY, XJ, JV), pp. 603–610.
- ISSTA-2006-ZhangKPWJMZ #analysis
- The case for analysis preserving language transformation (XZ, LK, MP, SW, TJ, GM, LZ), pp. 191–202.
- VMCAI-2006-RanzatoT #abstract interpretation
- Strong Preservation of Temporal Fixpoint-Based Operators by Abstract Interpretation (FR, FT), pp. 332–347.
- WICSA-2005-TibermacineFS #architecture #component #development #process
- Preserving Architectural Choices throughout the Component-based Software Development Process (CT, RF, SS), pp. 121–130.
- DAC-2005-ZhangCHGC #analysis #polynomial #statistics
- Correlation-preserved non-gaussian statistical timing analysis with quadratic timing model (LZ, WC, YH, JAG, CCPC), pp. 83–88.
- DAC-2005-ZhouMA #reduction
- Structure preserving reduction of frequency-dependent interconnect (QZ, KM, ACA), pp. 939–942.
- PODS-2005-Gehrke #analysis #modelling #privacy #tutorial
- Models and methods for privacy-preserving data publishing and analysis: invited tutorial (JG), p. 316.
- SIGMOD-2005-AgrawalST #privacy
- Privacy Preserving OLAP (RA, RS, DT), pp. 251–262.
- VLDB-2005-BarbosaFM #design #information management #xml
- Designing Information-Preserving Mapping Schemes for XML (DB, JF, AOM), pp. 109–120.
- VLDB-2005-BohannonFFN #xml
- Information Preserving XML Schema Embedding (PB, WF, MF, PPSN), pp. 85–96.
- VLDB-2005-ZhangZ #distributed #information management #privacy
- Distributed Privacy Preserving Information Sharing (NZ, WZ), pp. 889–900.
- TACAS-2005-RanzatoT #abstract interpretation #algorithm #refinement
- An Abstract Interpretation-Based Refinement Algorithm for Strong Preservation (FR, FT), pp. 140–156.
- CIAA-2005-BaillyCS #behaviour #communication #component #composition #contract
- Component Composition Preserving Behavioural Contracts Based on Communication Traces (AB, MC, ISR), pp. 54–65.
- ICALP-2005-AtseriasDG #finite
- Preservation Under Extensions on Well-Behaved Finite Structures (AA, AD, MG), pp. 1437–1449.
- ICEIS-v3-2005-BassilRKKR #process
- Preserving the Context of Interrupted Business Process Activities (SB, SR, RKK, PGK, MR), pp. 38–45.
- CIKM-2005-FanLHB #approach #novel #privacy #video
- A novel approach for privacy-preserving video sharing (JF, HL, MSH, EB), pp. 609–616.
- ICML-2005-HeCM #analysis #locality #statistics
- Statistical and computational analysis of locality preserving projection (XH, DC, WM), pp. 281–288.
- KDD-2005-JagannathanW #clustering #distributed #privacy
- Privacy-preserving distributed k-means clustering over arbitrarily partitioned data (GJ, RNW), pp. 593–599.
- KDD-2005-YangZW
- Anonymity-preserving data collection (ZY, SZ, RNW), pp. 334–343.
- KDD-2005-ZhangWZ #classification #privacy
- A new scheme on privacy-preserving data classification (NZ, SW, WZ), pp. 374–383.
- SIGIR-2005-CaiH #locality #orthogonal
- Orthogonal locality preserving indexing (DC, XH), pp. 3–10.
- SAC-2005-ZhangM #learning #privacy
- Privacy preserving learning in negotiation (SZ, FM), pp. 821–825.
- LICS-2005-Rossman
- Existential Positive Types and Preservation under Homomorphisisms (BR), pp. 467–476.
- DAC-2004-WongBK #performance #reduction
- Passivity-preserving model reduction via a computationally efficient project-and-balance scheme (NW, VB, CKK), pp. 369–374.
- DATE-v1-2004-LiPZSSS
- State-Preserving vs. Non-State-Preserving Leakage Control in Caches (YL, DP, YZ, KS, MRS, KS), pp. 22–29.
- HT-2004-MarshallG #hypermedia #requirements
- Saving private hypertext: requirements and pragmatic dimensions for preservation (CCM, GG), pp. 130–138.
- PODS-2004-AtseriasDK #morphism #on the #query
- On Preservation under Homomorphisms and Unions of Conjunctive Queries (AA, AD, PGK), pp. 319–329.
- SIGMOD-2004-AgrawalKSX #encryption
- Order-Preserving Encryption for Numeric Data (RA, JK, RS, YX), pp. 563–574.
- VLDB-2004-HoreMT #privacy #query
- A Privacy-Preserving Index for Range Queries (BH, SM, GT), pp. 720–731.
- ESOP-2004-RanzatoT #abstract interpretation
- Strong Preservation as Completeness in Abstract Interpretation (FR, FT), pp. 18–32.
- IFM-2004-SeceleanuP #approach #design #uml
- Constituent Elements of a Correctness-Preserving UML Design Approach (TS, JP), pp. 227–246.
- CSCW-2004-LiL #editing
- Preserving operation effects relation in group editors (DL, RL), pp. 457–466.
- ICPR-v2-2004-KoskelaLO #clustering #image #metric #retrieval
- Entropy-Based Measures for Clustering and SOM Topology Preservation Applied to Content-Based Image Indexing and Retrieval (MK, JL, EO), pp. 1005–1009.
- ICPR-v2-2004-OkataniS #image
- Range Image Registration Preserving Local Structures of Object Surfaces (ISO, AS), pp. 224–228.
- ICPR-v2-2004-TremblaisA #algorithm #detection #multi #performance
- A Fast Multiscale Edge Detection Algorithm Based on a New Edge Preserving PDE Resolution Scheme (BT, BA), pp. 811–814.
- ICPR-v4-2004-Syeda-Mahmood #clustering
- Order-Preserving Clustering and Its Application to Gene Expression Data (TFSM), pp. 637–640.
- KDD-2004-SanilKLR #distributed #modelling #privacy
- Privacy preserving regression modelling via distributed computation (APS, AFK, XL, JPR), pp. 677–682.
- KDD-2004-WrightY #distributed #network #privacy #semistructured data
- Privacy-preserving Bayesian network structure computation on distributed heterogeneous data (RNW, ZY), pp. 713–718.
- KDD-2004-ZhuL #data mining #mining #privacy
- Optimal randomization for privacy preserving data mining (MYZ, LL), pp. 761–766.
- SIGIR-2004-HeCLM #documentation #locality #representation
- Locality preserving indexing for document representation (XH, DC, HL, WYM), pp. 96–103.
- PADL-2004-AtanassowCJ #haskell #named #xml
- UUXML: A Type-Preserving XML Schema-Haskell Data Binding (FA, DC, JJ), pp. 71–85.
- LDTA-2004-LohmannRS #attribute grammar #migration #recursion #semantics
- Semantics-preserving Migration of Semantic Rules During Left Recursion Removal in Attribute Grammars (WL, GR, MS), pp. 133–148.
- HPDC-2004-GilburdSW #data mining #mining #privacy
- Privacy-Preserving Data Mining on Data Grids in the Presence of Malicious Participants (BG, AS, RW), pp. 225–234.
- FATES-2004-Frutos-EscrigG #consistency
- Preserving Contexts for Soft Conformance Relation (DdFE, CGR), pp. 33–48.
- LICS-2004-BaldamusPV #π-calculus
- Sπ Calculus Translated to ?--Calculus Preserving May-Tests (MB, JP, BV), pp. 22–31.
- VMCAI-2004-BartheBR #compilation #security
- Security Types Preserving Compilation: (Extended Abstract) (GB, AB, TR), pp. 2–15.
- DocEng-2003-RodigBSS #implementation
- Preservation of digital publications: an OAIS extension and implementation (PR, UMB, JS, LS), pp. 131–139.
- PODS-2003-DinurN #privacy
- Revealing information while preserving privacy (ID, KN), pp. 202–210.
- PODS-2003-EvfimievskiGS #data mining #mining #privacy
- Limiting privacy breaches in privacy preserving data mining (AVE, JG, RS), pp. 211–222.
- PODS-2003-Gross-Amblard #database #documentation #relational #xml
- Query-preserving watermarking of relational databases and XML documents (DGA), pp. 191–201.
- VLDB-2003-BawaBA #documentation #network #privacy
- Privacy-Preserving Indexing of Documents on the Network (MB, RJBJ, RA), pp. 922–933.
- DLT-2003-HofbauerW #string #term rewriting
- Deleting String Rewriting Systems Preserve Regularity (DH, JW), pp. 337–348.
- KDD-2003-DuZ #data mining #mining #privacy #random #using
- Using randomized response techniques for privacy-preserving data mining (WD, JZZ), pp. 505–510.
- KDD-2003-VaidyaC #clustering #privacy
- Privacy-preserving k-means clustering over vertically partitioned data (JV, CC), pp. 206–215.
- UML-2003-Nunes #contract #ocl
- An OCL Extension for Low-Coupling Preserving Contracts (IN), pp. 310–324.
- CC-2003-LeagueST #compilation #java #precise
- Precision in Practice: A Type-Preserving Java Compiler (CL, ZS, VT), pp. 106–120.
- SOSP-2003-ManiatisRRBGM
- Preserving peer replicas by rate-limited sampled voting (PM, DSHR, MR, MB, TJG, YM), pp. 44–59.
- RTA-2003-WellsPK #diagrams
- Diagrams for Meaning Preservation (JBW, DP, FK), pp. 88–106.
- DAC-2002-SuBK #framework #reduction
- A factorization-based framework for passivity-preserving model reduction of RLC systems (QS, VB, CKK), pp. 40–45.
- SAS-2002-RanzatoT #model checking
- Making Abstract Model Checking Strongly Preserving (FR, FT), pp. 411–427.
- ICGT-2002-MensDJ #behaviour #formal method #program transformation
- Formalising Behaviour Preserving Program Transformations (TM, SD, DJ), pp. 286–301.
- ICEIS-2002-Al-JumailyCM #constraints #execution #relational
- An Execution Model for Preserving Cardinality Constraints in the Relational Model (HTAJ, DC, PM), pp. 819–822.
- ICPR-v1-2002-NiimiNKE #image
- Luminance Quasi-Preserving Color Quantization for Digital Steganography to Palette-Based Images (MN, HN, EK, ROE), pp. 252–254.
- ICPR-v2-2002-Chen
- Signal Processing for Preserving the Environment (CHC), p. 523.
- ICPR-v3-2002-PawlakR #image
- Non-Linear Local Harmonic Filters For Edge-Preserving Image Denoising (MP, ER), pp. 895–897.
- KDD-2002-EvfimievskiSAG #mining #privacy
- Privacy preserving mining of association rules (AVE, RS, RA, JG), pp. 217–228.
- KDD-2002-VaidyaC #mining #privacy
- Privacy preserving association rule mining in vertically partitioned data (JV, CC), pp. 639–644.
- UML-2002-EngelsHKG #evolution
- Consistency-Preserving Model Evolution through Transformations (GE, RH, JMK, LG), pp. 212–226.
- OOPSLA-2002-ShufGFAS #garbage collection #java #locality
- Creating and preserving locality of java applications at allocation and garbage collection times (YS, MG, HF, AWA, JPS), pp. 13–25.
- PADL-2002-VandeginsteSD #garbage collection #order #prolog
- Segment Order Preserving and Generational Garbage Collection for Prolog (RV, KFS, BD), pp. 299–317.
- SAC-2002-Naharro-BerrocalPUV #reduction #visual notation #visualisation
- Approaches to comprehension-preserving graphical reduction of program visualizations (FNB, CPF, JUF, JÁVI), pp. 771–777.
- RTA-2002-SekiTFK #term rewriting
- Layered Transducing Term Rewriting System and Its Recognizability Preserving Property (HS, TT, YF, YK), pp. 98–113.
- DAC-2001-BhanjaR #dependence #modelling #network #probability #process #using
- Dependency Preserving Probabilistic Modeling of Switching Activity using Bayesian Networks (SB, NR), pp. 209–214.
- PODS-2001-AgrawalA #algorithm #data mining #design #mining #on the #privacy #quantifier
- On the Design and Quantification of Privacy Preserving Data Mining Algorithms (DA, CCA).
- VLDB-2001-Duranti #authentication
- The Long-Term Preservation of Authentic Electronic Records (LD), pp. 625–628.
- FASE-J-1998-PadbergGE01 #refinement #rule-based #safety
- Rule-based refinement of high-level nets preserving safety properties (JP, MG, CE), pp. 97–118.
- SCAM-2001-Vanter #source code #tool support
- Preserving the Documentary Structure of Source Code in Language-Based Transformation Tools (MvdV), pp. 133–143.
- STOC-2001-NaorN #communication #evaluation #protocol
- Communication preserving protocols for secure function evaluation (MN, KN), pp. 590–599.
- FME-2001-Jurjens #refinement
- Secrecy-Preserving Refinement (JJ), pp. 135–152.
- SIGIR-2001-SaraivaMFMRZ #scalability
- Rank-Preserving Two-Level Caching for Scalable Search Engines (PCS, ESdM, RCF, WMJ, BARN, NZ), pp. 51–58.
- POPL-2001-WangA #garbage collection
- Type-preserving garbage collectors (DCW, AWA), pp. 166–178.
- DAC-2000-MeguerdichianP
- Watermarking while preserving the critical path (SM, MP), pp. 108–111.
- SIGMOD-2000-AgrawalS #data mining #mining #privacy
- Privacy-Preserving Data Mining (RA, RS), pp. 439–450.
- FASE-2000-PadbergHG #algebra #safety
- Stepwise Introduction and Preservation of Safety Properties in Algebraic High-Level Net Systems (JP, KH, MG), pp. 249–265.
- ICSM-2000-Chapin #roadmap
- Trends in Preserving and Enhancing the Value of Software (NC), pp. 6–8.
- ICSM-2000-GibsonDM #correctness #maintenance
- The Application of Correctness Preserving Transformations to Software Maintenance (JPG, TFD, BAM), p. 108–?.
- ICSM-2000-Olver #perspective
- Preserving the Value of Software — A CIO Perspective (THO), p. 9–?.
- STOC-2000-Vadhan #complexity #interactive #on the #proving
- On transformation of interactive proofs that preserve the prover’s complexity (SPV), pp. 200–207.
- ICML-2000-SebbanN #problem
- Instance Pruning as an Information Preserving Problem (MS, RN), pp. 855–862.
- ICPR-v3-2000-SmolkaW #image #random
- Edge Preserving Image Smoothing Based on Self Avoiding Random Walk (BS, KWW), pp. 3668–3671.
- POPL-2000-KomondoorH #semantics
- Semantics-Preserving Procedure Extraction (RK, SH), pp. 155–169.
- RTA-2000-TakaiKS #effectiveness #finite #linear #term rewriting
- Right-Linear Finite Path Overlapping Term Rewriting Systems Effectively Preserve Recognizability (TT, YK, HS), pp. 246–260.
- PODS-1999-Raman #clustering #database #locality #theory and practice
- Locality Preserving Dictionaries: Theory and Application to Clustering in Databases (VR), pp. 337–345.
- STOC-1999-CrescenzoI
- Security-Preserving Hardness-Amplification for Any Regular One-Way Function (GDC, RI), pp. 169–178.
- DLT-1999-KvetonK
- Functions preserving classes of languages (PK, VK), pp. 81–102.
- FM-v2-1999-Moreira #component #proving
- Proof Preservation in Component Generalization (AMM), p. 1866.
- TLCA-1999-Ritter #termination
- Characterising Explicit Substitutions which Preserve Termination (ER), pp. 325–339.
- FASE-1998-PadbergGE #refinement #rule-based #safety
- Rule-Based Refinement of High-Level Nets Preserving Safety Properties (JP, MG, CE), pp. 221–238.
- TAGT-1998-SkodinisW
- Neighborhood-Preserving Node Replacements (KS, EW), pp. 45–58.
- ICPR-1998-ArcelliS #parallel
- Parallel lowering of digital pictures by topology preserving operations (CA, LS), pp. 1601–1603.
- ICPR-1998-Heikkila #bound #detection
- Moment and curvature preserving technique for accurate ellipse boundary detection (JH), pp. 734–737.
- ICPR-1998-MottlKK #image
- Edge-preserving in generalized smoothing of signals and images (VM, AK, AK), pp. 1579–1581.
- ICPR-1998-SeemannT #image #segmentation #using
- Structure preserving noise filtering of images using explicit local segmentation (TS, PET), pp. 1610–1612.
- OOPSLA-1998-AgerboC #design pattern #how
- How to Preserve the Benefits of Design Patterns (EA, AC), pp. 134–143.
- DAC-1997-KernsY #congruence #network #reduction
- Preservation of Passivity During RLC Network Reduction via Split Congruence Transformations (KJK, ATY), pp. 34–39.
- STOC-1997-IndykMRV #multi
- Locality-Preserving Hashing in Multidimensional Spaces (PI, RM, PR, SV), pp. 618–625.
- CAiSE-1997-CathalaP #behaviour #how #why
- Preserving Behaviour: Why and How (FC, PP), pp. 333–346.
- LOPSTR-1997-LeuschelMS #logic programming #source code #termination
- Preserving Termination of Tabled Logic Programs While Unfolding (ML, BM, KFS), pp. 189–205.
- RTA-1997-Otto #on the #string #term rewriting
- On the Property of Preserving Regularity for String-Rewriting Systems (FO), pp. 83–97.
- PLDI-1996-EichenbergerD #constraints #multi #pipes and filters #scheduling
- A Reduced Multipipeline Machine Description that Preserves Scheduling Constraints (AEE, ESD), pp. 12–22.
- ICPR-1996-ChiuT #algorithm
- A feature-preserved thinning algorithm for handwritten Chinese characters (HPC, DCT), pp. 235–239.
- ICPR-1996-MeminP #robust
- Robust discontinuity-preserving model for estimating optical flow (ÉM, PP), pp. 920–924.
- ALP-1996-FerreiraKP #composition #normalisation #λ-calculus
- λ-Calculi with Explicit Substitutions and Composition Which Preserve β-Strong Normalization (MCFF, DK, LP), pp. 284–298.
- LOPSTR-1996-BossiC #termination
- Replacement Can Preserve Termination (AB, NC), pp. 104–129.
- SAC-1996-DemoenET #garbage collection #order #prolog
- Segment order preserving copying garbage collection for WAM based Prolog (BD, GE, PT), pp. 380–386.
- LICS-1996-Munoz #calculus #confluence #normalisation
- Confluence and Preservation of Strong Normalisation in an Explicit Substitutions Calculus (CAM), pp. 440–447.
- RTA-1996-BlooR #combinator #reduction
- Combinatory Reduction Systems with Explicit Substitution that Preserve Strong Nomalisation (RB, KHR), pp. 169–183.
- DAC-1995-El-MalehMRM #on the #testing
- On Test Set Preservation of Retimed Circuits (AHEM, TEM, JR, WM), pp. 176–182.
- SEKE-1995-BernardeschiFP #architecture #correctness #interactive #specification #user interface
- Application of Correctness Preserving Transformations for Deriving Architectural Descriptions of Interactive Systems from User Interface Specifications (CB, AF, FP), pp. 234–243.
- LOPSTR-1995-Leuschel #constraints #deduction
- Ecological Partial Deduction: Preserving Characteristic Trees Without Constraints (ML), pp. 1–16.
- VLDB-1994-LitwinNS #data type #distributed #order #product line #scalability
- RP*: A Family of Order Preserving Scalable Distributed Data Structures (WL, MAN, DAS), pp. 342–353.
- CIKM-1994-VidalW #integration #semantics
- Preserving Update Semantics in Schema Integration (VMPV, MW), pp. 263–271.
- ALP-1994-BossiC #termination
- Preserving Universal Termination through Unfold/Fold (AB, NC), pp. 269–286.
- LOPSTR-1994-BossiE #semantics #source code
- More on Unfold/Fold Transformations of Normal Programs: Preservation of Fitting’s Semantics (AB, SE), pp. 311–331.
- INTERCHI-1993-HerbslebK #design #what
- Preserving knowledge in design projects: what designers need to know (JDH, EK), pp. 7–14.
- SEKE-1993-StaryF #design #how #semantics #specification
- How Semantical Design Languages Help to Preserve Specification/Design-Consistency (CS, RF), pp. 462–471.
- FSE-1993-Griswold #data flow
- Direct Update of Data Flow Representations for a Meaning-Preserving Program Restructuring Tool (WGG), pp. 42–55.
- CAV-1993-BrinksmaLB #composition
- Functionality Decomposition by Compositional Correstness Preserving Transformation (EB, RL, PB), pp. 371–384.
- DAC-1992-BatekH #logic
- Test-Set Preserving Logic Transformations (MJB, JPH), pp. 454–458.
- PLILP-1992-Amtoft #termination
- Unfold/fold Transformations Preserving Termination Properties (TA), pp. 187–201.
- CAV-1992-BensalemBLS #simulation
- Property Preserving Simulations (SB, AB, CL, JS), pp. 260–273.
- PEPM-1991-ProiettiP #prolog #semantics
- Semantics Preserving Transformation Rules for Prolog (MP, AP), pp. 274–284.
- ICALP-1991-Vogler #similarity
- Deciding History Preserving Bisimilarity (WV), pp. 495–505.
- OOPSLA-1991-Bergstein
- Object-Preserving Class Transformations (PLB), pp. 299–313.
- DAC-1990-Marple
- A Hierarchy Preserving Hierarchical Compactor (DM), pp. 375–381.
- SIGIR-1990-FoxCDH #information retrieval #order
- Order Preserving Minimal Perfect Hash Functions and Information Retrieval (EAF, QFC, AMD, LSH), pp. 279–311.
- ALP-1990-Sato #equivalence #first-order
- An Equivalence Preserving First Order Unfold/fold Transformation System (TS), pp. 173–188.
- STOC-1989-KochLMRR #network
- Work-Preserving Emulations of Fixed-Connection Networks (Extended Abstract) (RRK, FTL, BMM, SR, ALR), pp. 227–240.
- JICSCP-1988-Fribourg88 #induction #prolog #source code
- Equivalence-Preserving Transformations of Inductive Properties of Prolog Programs (LF), pp. 893–908.
- PODS-1986-Robinson #linear #order #statistics #using
- Order Preserving Linear Hashing Using Dynamic Key Statistics (JTR), pp. 91–99.
- VLDB-1985-OzkarahanO #clustering #database #order
- Dynamic and Order Preserving Data Partitioning for Database Machines (EAO, AMO), pp. 358–368.
- VLDB-1983-KlopproggeL #concept #database #modelling
- Modelling Information Preserving Databases: Consequences of the Concept of Time (MRK, PCL), pp. 399–416.
- POPL-1981-Lowney #array
- Carrier Arrays: An Idiom-Preserving Extension to APL (PGL), pp. 1–13.
- ICALP-1979-Nijholt #recursion
- Structure Preserving Transformations on Non-Left-Recursive Grammars (Preliminary Version) (AN), pp. 446–459.
- VLDB-1978-AroraC #database #relational
- The Information Preserving Properties of Relational Database Transformations (AKA, CRC), pp. 352–359.
- ICALP-1977-AusielloDP #combinator #on the #problem #reduction
- On the Structure of Combinatorial Problems and Structure Preserving Reductions (GA, AD, MP), pp. 45–60.
- POPL-1975-Gerhart #program transformation
- Correctness-Preserving Program Transformations (SLG), pp. 54–66.