Sciweavers

2526 search results - page 428 / 506
» A New Algorithm for Answer Set Computation
Sort
View
204
Voted
FOCS
2007
IEEE
15 years 9 months ago
Mechanism Design via Differential Privacy
We study the role that privacy-preserving algorithms, which prevent the leakage of specific information about participants, can play in the design of mechanisms for strategic age...
Frank McSherry, Kunal Talwar
95
Voted
SIGCOMM
2006
ACM
15 years 8 months ago
In VINI veritas: realistic and controlled network experimentation
This paper describes VINI, a virtual network infrastructure that allows network researchers to evaluate their protocols and services in a realistic environment that also provides ...
Andy C. Bavier, Nick Feamster, Mark Huang, Larry L...
119
Voted
DAGM
2003
Springer
15 years 7 months ago
Empirical Analysis of Detection Cascades of Boosted Classifiers for Rapid Object Detection
Recently Viola et al. have introduced a rapid object detection scheme based on a boosted cascade of simple feature classifiers. In this paper we introduce and empirically analysis ...
Rainer Lienhart, Alexander Kuranov, Vadim Pisarevs...
117
Voted
AINA
2010
IEEE
15 years 7 months ago
A Quadratic, Complete, and Minimal Consistency Diagnosis Process for Firewall ACLs
— Developing and managing firewall Access Control Lists (ACLs) are hard, time-consuming, and error-prone tasks for a variety of reasons. Complexity of networks is constantly incr...
Sergio Pozo, A. J. Varela-Vaca, Rafael M. Gasca
146
Voted
DANCE
2002
IEEE
15 years 7 months ago
Active Names: Flexible Location and Transport of Wide-Area Resources
In this paper, we explore flexible name resolution as a way of supporting extensibility for wide-area distributed services. Our approach, called Active Names, maps names to a cha...
Amin Vahdat, Michael Dahlin, Thomas E. Anderson, A...