Sciweavers

1096 search results - page 219 / 220
» Computation Slicing: Techniques and Theory
Sort
View
DGO
2011
247views Education» more  DGO 2011»
14 years 5 days ago
Open government and e-government: democratic challenges from a public value perspective
We consider open government (OG) within the context of egovernment and its broader implications for the future of public administration. We argue that the current US Administratio...
Teresa M. Harrison, Santiago Guerrero, G. Brian Bu...
103
Voted
IACR
2011
87views more  IACR 2011»
14 years 12 hour ago
Is privacy compatible with truthfulness?
In the area of privacy-preserving data mining, a differentially private mechanism intuitively encourages people to share their data truthfully because they are at little risk of ...
David Xiao
118
Voted
SODA
2012
ACM
170views Algorithms» more  SODA 2012»
13 years 2 months ago
Compression via matroids: a randomized polynomial kernel for odd cycle transversal
The Odd Cycle Transversal problem (OCT) asks whether a given graph can be made bipartite by deleting at most k of its vertices. In a breakthrough result Reed, Smith, and Vetta (Op...
Stefan Kratsch, Magnus Wahlström
SIAMCOMP
2012
13 years 2 months ago
Randomized Competitive Algorithms for Generalized Caching
We consider online algorithms for the generalized caching problem. Here we are given a cache of size k and pages with arbitrary sizes and fetching costs. Given a request sequence ...
Nikhil Bansal, Niv Buchbinder, Joseph Naor

Publication
303views
13 years 10 months ago
Evolutionary synthesis of analog networks
he significant increase in the available computational power that took place in recent decades has been accompanied by a growing interest in the application of the evolutionary ap...
Claudio Mattiussi