Sciweavers

8699 search results - page 1696 / 1740
» Elements of the Theory of Computation
Sort
View
PLDI
2010
ACM
15 years 4 months ago
Mint: Java multi-stage programming using weak separability
Multi-stage programming (MSP) provides a disciplined approach to run-time code generation. In the purely functional setting, it has been shown how MSP can be used to reduce the ov...
Edwin Westbrook, Mathias Ricken, Jun Inoue, Yilong...
PODS
2010
ACM
306views Database» more  PODS 2010»
15 years 4 months ago
Optimizing linear counting queries under differential privacy
Differential privacy is a robust privacy standard that has been successfully applied to a range of data analysis tasks. But despite much recent work, optimal strategies for answe...
Chao Li, Michael Hay, Vibhor Rastogi, Gerome Mikla...
COOPIS
2002
IEEE
15 years 4 months ago
An Evolvable Framework for Perceptual Collaborative Applications
The Neem Platform is a research test bed for Project Neem, concerned with the development of socially and culturally aware collaborative systems in a wide range of domains, through...
Paulo Barthelmess, Clarence A. Ellis, The Neem Pla...
HICSS
2002
IEEE
87views Biometrics» more  HICSS 2002»
15 years 4 months ago
Using Enterprise Reference Models for Automated ISO 9000 Compliance Evaluation
A computational enterprise model representing key facets of an organization can be an effective tool. For example, a specific organization's quality management business proce...
Henry M. Kim, Mark S. Fox
SIGECOM
2010
ACM
125views ECommerce» more  SIGECOM 2010»
15 years 3 months ago
Information asymmetries in pay-per-bid auctions
Recently, some mainstream e-commerce web sites have begun using “pay-per-bid” auctions to sell items, from video games to bars of gold. In these auctions, bidders incur a cost...
John W. Byers, Michael Mitzenmacher, Georgios Zerv...
« Prev « First page 1696 / 1740 Last » Next »