Sciweavers

2131 search results - page 77 / 427
» Immunity for Closed Sets
Sort
View
98
Voted
APPROX
2010
Springer
168views Algorithms» more  APPROX 2010»
15 years 2 months ago
Differential Privacy and the Fat-Shattering Dimension of Linear Queries
In this paper, we consider the task of answering linear queries under the constraint of differential privacy. This is a general and well-studied class of queries that captures oth...
Aaron Roth
86
Voted
JC
2007
57views more  JC 2007»
15 years 21 days ago
Discrepancy with respect to convex polygons
We study the problem of discrepancy of finite point sets in the unit square with respect to convex polygons, when the directions of the edges are fixed, when the number of edges ...
W. W. L. Chen, G. Travaglini
ISIPTA
2003
IEEE
110views Mathematics» more  ISIPTA 2003»
15 years 6 months ago
Extensions of Expected Utility Theory and Some Limitations of Pairwise Comparisons
We contrast three decision rules that extend Expected Utility to contexts where a convex set of probabilities is used to depict uncertainty: Γ-Maximin, Maximality, and E-admissib...
Mark J. Schervish, Teddy Seidenfeld, Joseph B. Kad...
99
Voted
DAC
2004
ACM
16 years 1 months ago
Toward a methodology for manufacturability-driven design rule exploration
Resolution enhancement techniques (RET) such as optical proximity correction (OPC) and phase-shift mask (PSM) technology are deployed in modern processes to increase the fidelity ...
Luigi Capodieci, Puneet Gupta, Andrew B. Kahng, De...
104
Voted
ICDE
2010
IEEE
197views Database» more  ICDE 2010»
16 years 17 days ago
Monitoring Continuous State Violation in Datacenters: Exploring the Time Dimension
Monitoring global states of an application deployed over distributed nodes becomes prevalent in today's datacenters. State monitoring requires not only correct monitoring resu...
Shicong Meng, Ting Wang, Ling Liu