Sciweavers

994 search results - page 44 / 199
» Custom Computing Machines for the Set Covering Problem
Sort
View
89
Voted
WADS
2007
Springer
98views Algorithms» more  WADS 2007»
15 years 6 months ago
Computing Best Coverage Path in the Presence of Obstacles in a Sensor Field
We study the presence of obstacles in computing BCP(s, t) (Best Coverage Path between two points s and t) in a 2D field under surveillance by sensors. Consider a set of m line seg...
Senjuti Basu Roy, Gautam Das, Sajal Das
99
Voted
ACL
2010
14 years 10 months ago
Distributional Similarity vs. PU Learning for Entity Set Expansion
Distributional similarity is a classic technique for entity set expansion, where the system is given a set of seed entities of a particular class, and is asked to expand the set u...
Xiaoli Li, Lei Zhang, Bing Liu, See-Kiong Ng
TVLSI
2010
14 years 7 months ago
Architectural Enhancement and System Software Support for Program Code Integrity Monitoring in Application-Specific Instruction-
Program code in a computer system can be altered either by malicious security attacks or by various faults in microprocessors. At the instruction level, all code modifications are ...
Hai Lin, Yunsi Fei, Xuan Guan, Zhijie Jerry Shi

Lecture Notes
443views
16 years 10 months ago
Design and Analysis of Computer Algorithms
"This course will consist of a number of major sections. The first will be a short review of some preliminary material, including asymptotics, summations, and recurrences and ...
David M. Mount
FOCS
2005
IEEE
15 years 6 months ago
Mechanism Design via Machine Learning
We use techniques from sample-complexity in machine learning to reduce problems of incentive-compatible mechanism design to standard algorithmic questions, for a wide variety of r...
Maria-Florina Balcan, Avrim Blum, Jason D. Hartlin...