Sciweavers

7930 search results - page 1585 / 1586
» Greedy in Approximation Algorithms
Sort
View
CORR
2012
Springer
210views Education» more  CORR 2012»
12 years 1 months ago
Stability of the Max-Weight Protocol in Adversarial Wireless Networks
In this paper we consider the MAX-WEIGHT protocol for routing and scheduling in wireless networks under an adversarial model. This protocol has received a significant amount of a...
Sungsu Lim, Kyomin Jung, Matthew Andrews
POPL
2012
ACM
12 years 1 months ago
Probabilistic relational reasoning for differential privacy
Differential privacy is a notion of confidentiality that protects the privacy of individuals while allowing useful computations on their private data. Deriving differential priva...
Gilles Barthe, Boris Köpf, Federico Olmedo, S...
ICDE
2012
IEEE
216views Database» more  ICDE 2012»
11 years 8 months ago
Load Balancing in MapReduce Based on Scalable Cardinality Estimates
—MapReduce has emerged as a popular tool for distributed and scalable processing of massive data sets and is increasingly being used in e-science applications. Unfortunately, the...
Benjamin Gufler, Nikolaus Augsten, Angelika Reiser...
TOG
2012
297views Communications» more  TOG 2012»
11 years 8 months ago
Adaptive manifolds for real-time high-dimensional filtering
We present a technique for performing high-dimensional filtering of images and videos in real time. Our approach produces high-quality results and accelerates filtering by compu...
Eduardo S. L. Gastal, Manuel M. Oliveira
KDD
2012
ACM
166views Data Mining» more  KDD 2012»
11 years 8 months ago
Selecting a characteristic set of reviews
Online reviews provide consumers with valuable information that guides their decisions on a variety of fronts: from entertainment and shopping to medical services. Although the pr...
Theodoros Lappas, Mark Crovella, Evimaria Terzi
« Prev « First page 1585 / 1586 Last » Next »