Sciweavers

7006 search results - page 1231 / 1402
» Approximation Algorithms
Sort
View
FOCS
2007
IEEE
15 years 11 months ago
Mechanism Design via Differential Privacy
We study the role that privacy-preserving algorithms, which prevent the leakage of specific information about participants, can play in the design of mechanisms for strategic age...
Frank McSherry, Kunal Talwar
HICSS
2007
IEEE
138views Biometrics» more  HICSS 2007»
15 years 11 months ago
A Probabilistic Graphical Approach to Computing Electricity Price Duration Curves under Price and Quantity Competition
Abstract— The electricity price duration curve (EPDC) represents the probability distribution function of the electricity price considered as a random variable. The price uncerta...
Pascal Michaillat, Shmuel S. Oren
ICC
2007
IEEE
141views Communications» more  ICC 2007»
15 years 11 months ago
Accurate Classification of the Internet Traffic Based on the SVM Method
—The need to quickly and accurately classify Internet traffic for security and QoS control has been increasing significantly with the growing Internet traffic and applications ov...
Zhu Li, Ruixi Yuan, Xiaohong Guan
ICIP
2007
IEEE
15 years 11 months ago
Complexity Control for Real-Time Video Coding
A methodology for complexity scalable video encoding and complexity control within the framework of the H.264/AVC video encoder is presented. To yield good rate-distortion perform...
Emrah Akyol, Debargha Mukherjee, Yuxin Liu
ICRA
2007
IEEE
170views Robotics» more  ICRA 2007»
15 years 11 months ago
Space-time A Contrario Clustering for Detecting Coherent Motions
Abstract— This paper presents a method for detecting independent temporally-persistent motion patterns in image sequences. The result is a description of the dynamic content of a...
Thomas Veit, Frédéric Cao, Patrick B...
« Prev « First page 1231 / 1402 Last » Next »