Sciweavers

893 search results - page 83 / 179
» Descent Theory for Schemes
Sort
View
MM
2004
ACM
109views Multimedia» more  MM 2004»
15 years 5 months ago
Loss-resilient on-demand media streaming using priority encoding
A novel solution to the reliable multicast problem is the “digital fountain” approach, in which data is encoded with an erasure protection code before transmission, and receiv...
Cheng Huang, Ramaprabhu Janakiraman, Lihao Xu
ATAL
2004
Springer
15 years 5 months ago
Multi-Agent Simulation of Collaborative Strategies in a Supply Chain
The bullwhip effect is the amplification of the order variability in a supply chain. This phenomenon causes important financial cost due to higher inventory levels and agility r...
Thierry Moyaux, Brahim Chaib-draa, Sophie D'Amours
KDD
2004
ACM
159views Data Mining» more  KDD 2004»
15 years 5 months ago
Optimal randomization for privacy preserving data mining
Randomization is an economical and efficient approach for privacy preserving data mining (PPDM). In order to guarantee the performance of data mining and the protection of individ...
Michael Yu Zhu, Lei Liu
FCT
2003
Springer
15 years 5 months ago
On Exact and Approximation Algorithms for Distinguishing Substring Selection
Abstract. The NP-complete Distinguishing Substring Selection problem (DSSS for short) asks, given a set of “good” strings and a set of “bad” strings, for a solution string ...
Jens Gramm, Jiong Guo, Rolf Niedermeier
APN
1999
Springer
15 years 4 months ago
Structural Methods to Improve the Symbolic Analysis of Petri Nets
Abstract. Symbolic techniques based on BDDs (Binary Decision Diagrams) have emerged as an e cient strategy for the analysis of Petri nets. The existing techniques for the symbolic ...
Enric Pastor, Jordi Cortadella, Marco A. Peñ...