Sciweavers

137 search results - page 23 / 28
» Cross-Serial Dependencies Are Not Hard to Process
Sort
View
IMC
2010
ACM
14 years 7 months ago
Network tomography on correlated links
Network tomography establishes linear relationships between the characteristics of individual links and those of end-toend paths. It has been proved that these relationships can b...
Denisa Ghita, Katerina J. Argyraki, Patrick Thiran
ISCA
2011
IEEE
333views Hardware» more  ISCA 2011»
14 years 25 days ago
The impact of memory subsystem resource sharing on datacenter applications
In this paper we study the impact of sharing memory resources on five Google datacenter applications: a web search engine, bigtable, content analyzer, image stitching, and protoc...
Lingjia Tang, Jason Mars, Neil Vachharajani, Rober...
SIGMOD
2011
ACM
179views Database» more  SIGMOD 2011»
14 years 7 days ago
No free lunch in data privacy
Differential privacy is a powerful tool for providing privacypreserving noisy query answers over statistical databases. It guarantees that the distribution of noisy query answers...
Daniel Kifer, Ashwin Machanavajjhala
STOC
2012
ACM
256views Algorithms» more  STOC 2012»
12 years 12 months ago
Competitive contagion in networks
We develop a game-theoretic framework for the study of competition between firms who have budgets to “seed” the initial adoption of their products by consumers located in a s...
Sanjeev Goyal, Michael Kearns
STOC
2012
ACM
251views Algorithms» more  STOC 2012»
12 years 12 months ago
Minimax option pricing meets black-scholes in the limit
Option contracts are a type of financial derivative that allow investors to hedge risk and speculate on the variation of an asset’s future market price. In short, an option has...
Jacob Abernethy, Rafael M. Frongillo, Andre Wibiso...