Sciweavers

4255 search results - page 848 / 851
» Cover
Sort
View
ICDE
2012
IEEE
238views Database» more  ICDE 2012»
12 years 12 months ago
Mining Knowledge from Data: An Information Network Analysis Approach
Abstract—Most objects and data in the real world are interconnected, forming complex, heterogeneous but often semistructured information networks. However, many database research...
Jiawei Han, Yizhou Sun, Xifeng Yan, Philip S. Yu
INFOCOM
2012
IEEE
12 years 12 months ago
FemtoCaching: Wireless video content delivery through distributed caching helpers
Abstract—We suggest a novel approach to handle the ongoing explosive increase in the demand for video content in wireless/mobile devices. We envision femtocell-like base stations...
Negin Golrezaei, Karthikeyan Shanmugam, Alexandros...
CRYPTO
2012
Springer
268views Cryptology» more  CRYPTO 2012»
12 years 12 months ago
Secret Sharing Schemes for Very Dense Graphs
A secret-sharing scheme realizes a graph if every two vertices connected by an edge can reconstruct the secret while every independent set in the graph does not get any informatio...
Amos Beimel, Oriol Farràs, Yuval Mintz
KDD
2012
ACM
199views Data Mining» more  KDD 2012»
12 years 11 months ago
Trustworthy online controlled experiments: five puzzling outcomes explained
Online controlled experiments are often utilized to make datadriven decisions at Amazon, Microsoft, eBay, Facebook, Google, Yahoo, Zynga, and at many other companies. While the th...
Ron Kohavi, Alex Deng, Brian Frasca, Roger Longbot...
SODA
2012
ACM
253views Algorithms» more  SODA 2012»
12 years 11 months ago
Kernelization of packing problems
Kernelization algorithms are polynomial-time reductions from a problem to itself that guarantee their output to have a size not exceeding some bound. For example, d-Set Matching f...
Holger Dell, Dániel Marx