Sciweavers

2424 search results - page 97 / 485
» A general algorithm for data dependence analysis
Sort
View
ICDT
2010
ACM
172views Database» more  ICDT 2010»
15 years 8 months ago
k-jump strategy for preserving privacy in micro-data disclosure
In disclosing micro-data with sensitive attributes, the goal is usually two fold. First, the data utility of disclosed data should be maximized for analysis purposes. Second, the ...
Wen Ming Liu, Lingyu Wang, Lei Zhang
CODES
2007
IEEE
15 years 9 months ago
Improved response time analysis of tasks scheduled under preemptive Round-Robin
Round-Robin scheduling is the most popular time triggered scheduling policy, and has been widely used in communication networks for the last decades. It is an efficient schedulin...
Razvan Racu, Li Li, Rafik Henia, Arne Hamann, Rolf...
DILS
2005
Springer
15 years 8 months ago
Integrating Heterogeneous Microarray Data Sources Using Correlation Signatures
Abstract. Microarrays are one of the latest breakthroughs in experimental molecular biology. Thousands of different research groups generate tens of thousands of microarray gene e...
Jaewoo Kang, Jiong Yang, Wanhong Xu, Pankaj Chopra
COMPGEOM
2011
ACM
14 years 6 months ago
An output-sensitive algorithm for persistent homology
In this paper, we present the first output-sensitive algorithm to compute the persistence diagram of a filtered simplicial complex. For any Γ > 0, it returns only those homo...
Chao Chen, Michael Kerber
GECCO
2009
Springer
167views Optimization» more  GECCO 2009»
15 years 9 months ago
Fixed-parameter evolutionary algorithms and the vertex cover problem
In this paper, we consider multi-objective evolutionary algorithms for the Vertex Cover problem in the context of parameterized complexity. We relate the runtime of our algorithms...
Stefan Kratsch, Frank Neumann