Sciweavers

1484 search results - page 165 / 297
» Ants meeting algorithms
Sort
View
93
Voted
SDMW
2004
Springer
15 years 3 months ago
Achieving Privacy Preservation when Sharing Data for Clustering
Abstract. In this paper, we address the problem of protecting the underlying attribute values when sharing data for clustering. The challenge is how to meet privacy requirements an...
Stanley R. M. Oliveira, Osmar R. Zaïane
89
Voted
WAOA
2004
Springer
111views Algorithms» more  WAOA 2004»
15 years 3 months ago
More Powerful and Simpler Cost-Sharing Methods
We provide a new technique to derive group strategyproof mechanisms for the cost-sharing problem. Our technique is simpler and provably more powerful than the existing one based on...
Paolo Penna, Carmine Ventre
ITC
2003
IEEE
116views Hardware» more  ITC 2003»
15 years 3 months ago
BIST for Deep Submicron ASIC Memories with High Performance Application
Today’s ASIC designs consist of more memory in terms of both area and number of instances. The shrinking of geometries has an even greater effect upon memories due to their tigh...
Theo J. Powell, Wu-Tung Cheng, Joseph Rayhawk, Ome...
ILP
2003
Springer
15 years 3 months ago
Query Optimization in Inductive Logic Programming by Reordering Literals
Query optimization is used frequently in relational database management systems. Most existing techniques are based on reordering the relational operators, where the most selective...
Jan Struyf, Hendrik Blockeel
COMPGEOM
2010
ACM
15 years 3 months ago
Lines avoiding balls in three dimensions revisited
Let B be a collection of n arbitrary balls in R3 . We establish an almost-tight upper bound of O(n3+ε ), for any ε > 0, on the complexity of the space F(B) of all the lines t...
Natan Rubin