Sciweavers

1982 search results - page 43 / 397
» Designing Efficient Distributed Algorithms Using Sampling Te...
Sort
View
94
Voted
SIGIR
2008
ACM
15 years 2 months ago
Generalising multiple capture-recapture to non-uniform sample sizes
Algorithms in distributed information retrieval often rely on accurate knowledge of the size of a collection. The "multiple capture-recapture" method of Shokouhi et al. ...
Paul Thomas
156
Voted
STOC
2002
ACM
177views Algorithms» more  STOC 2002»
16 years 2 months ago
Similarity estimation techniques from rounding algorithms
A locality sensitive hashing scheme is a distribution on a family F of hash functions operating on a collection of objects, such that for two objects x, y, PrhF [h(x) = h(y)] = si...
Moses Charikar
DAC
2006
ACM
16 years 3 months ago
An efficient and versatile scheduling algorithm based on SDC formulation
Scheduling plays a central role in the behavioral synthesis process, which automatically compiles high-level specifications into optimized hardware implementations. However, most ...
Jason Cong, Zhiru Zhang
120
Voted
CDC
2009
IEEE
156views Control Systems» more  CDC 2009»
15 years 6 months ago
Input design using Markov chains for system identification
This paper studies the input design problem for system identification where time domain constraints have to be considered. A finite Markov chain is used to model the input of the s...
Chiara Brighenti, Bo Wahlberg, Cristian R. Rojas
SIGKDD
2002
90views more  SIGKDD 2002»
15 years 1 months ago
Cryptographic Techniques for Privacy-Preserving Data Mining
Research in secure distributed computation, which was done as part of a larger body of research in the theory of cryptography, has achieved remarkable results. It was shown that n...
Benny Pinkas