Sciweavers

1382 search results - page 269 / 277
» Formal Analysis of Online Algorithms
Sort
View
92
Voted
PR
2000
102views more  PR 2000»
14 years 11 months ago
Bayesian face recognition
We propose a new technique for direct visual matching of images for the purposes of face recognition and image retrieval, using a probabilistic measure of similarity, based primar...
Baback Moghaddam, Tony Jebara, Alex Pentland
SIGMETRICS
2011
ACM
140views Hardware» more  SIGMETRICS 2011»
14 years 2 months ago
On the stability and optimality of universal swarms
Recent work on BitTorrent swarms has demonstrated that a bandwidth bottleneck at the seed can lead to the underutilization of the aggregate swarm capacity. Bandwidth underutilizat...
Xia Zhou, Stratis Ioannidis, Laurent Massouli&eacu...
177
Voted
ICDE
2008
IEEE
150views Database» more  ICDE 2008»
16 years 1 months ago
Link Privacy in Social Networks
We consider a privacy threat to a social network in which the goal of an attacker is to obtain knowledge of a significant fraction of the links in the network. We formalize the ty...
Aleksandra Korolova, Rajeev Motwani, Shubha U. Nab...
106
Voted
KDD
2007
ACM
165views Data Mining» more  KDD 2007»
16 years 1 days ago
Efficient and effective explanation of change in hierarchical summaries
Dimension attributes in data warehouses are typically hierarchical (e.g., geographic locations in sales data, URLs in Web traffic logs). OLAP tools are used to summarize the measu...
Deepak Agarwal, Dhiman Barman, Dimitrios Gunopulos...
208
Voted
POPL
2008
ACM
15 years 12 months ago
Imperative self-adjusting computation
Self-adjusting computation enables writing programs that can automatically and efficiently respond to changes to their data (e.g., inputs). The idea behind the approach is to stor...
Umut A. Acar, Amal Ahmed, Matthias Blume