Sciweavers

925 search results - page 185 / 185
» A Linguistic Theory of Robustness
Sort
View
INFOCOM
2011
IEEE
12 years 8 months ago
Secure and practical outsourcing of linear programming in cloud computing
—Cloud Computing has great potential of providing robust computational power to the society at reduced cost. It enables customers with limited computational resources to outsourc...
Cong Wang, Kui Ren, Jia Wang
PODS
2011
ACM
201views Database» more  PODS 2011»
12 years 7 months ago
Data exchange beyond complete data
In the traditional data exchange setting, source instances are restricted to be complete in the sense that every fact is either true or false in these instances. Although natural ...
Marcelo Arenas, Jorge Pérez, Juan L. Reutte...
SIGECOM
2011
ACM
219views ECommerce» more  SIGECOM 2011»
12 years 7 months ago
GSP auctions with correlated types
The Generalized Second Price (GSP) auction is the primary method by which sponsered search advertisements are sold. We study the performance of this auction in the Bayesian settin...
Brendan Lucier, Renato Paes Leme
STOC
2012
ACM
251views Algorithms» more  STOC 2012»
11 years 7 months ago
Minimax option pricing meets black-scholes in the limit
Option contracts are a type of financial derivative that allow investors to hedge risk and speculate on the variation of an asset’s future market price. In short, an option has...
Jacob Abernethy, Rafael M. Frongillo, Andre Wibiso...
SIGMETRICS
2012
ACM
257views Hardware» more  SIGMETRICS 2012»
11 years 7 months ago
Fair sampling across network flow measurements
Sampling is crucial for controlling resource consumption by internet traffic flow measurements. Routers use Packet Sampled NetFlow [9], and completed flow records are sampled in...
Nick G. Duffield