Sciweavers

2194 search results - page 332 / 439
» Improving HLRTA*( k )
Sort
View
188
Voted
SIGMOD
2008
ACM
206views Database» more  SIGMOD 2008»
16 years 28 days ago
Ad-hoc aggregations of ranked lists in the presence of hierarchies
A variety of web sites and web based services produce textual lists at varying time granularities ranked according to several criteria. For example, Google Trends produces lists o...
Nilesh Bansal, Sudipto Guha, Nick Koudas
93
Voted
MOBISYS
2008
ACM
16 years 11 days ago
Virtual trip lines for distributed privacy-preserving traffic monitoring
Automotive traffic monitoring using probe vehicles with Global Positioning System receivers promises significant improvements in cost, coverage, and accuracy. Current approaches, ...
Baik Hoh, Marco Gruteser, Ryan Herring, Jeff Ban, ...
MOBIHOC
2008
ACM
16 years 11 days ago
Dynamic packet fragmentation for wireless channels with failures
It was shown recently [7?9], under quite general conditions, that retransmission-based protocols may result in power-law delays and possibly zero throughput even if the distributi...
Predrag R. Jelenkovic, Jian Tan
81
Voted
SDM
2009
SIAM
149views Data Mining» more  SDM 2009»
15 years 10 months ago
Speeding Up Secure Computations via Embedded Caching.
Most existing work on Privacy-Preserving Data Mining (PPDM) focus on enabling conventional data mining algorithms with the ability to run in a secure manner in a multi-party setti...
K. Zhai, W. K. Ng, A. R. Herianto, S. Han
94
Voted
CCS
2009
ACM
15 years 7 months ago
Multi-party off-the-record messaging
Most cryptographic algorithms provide a means for secret and authentic communication. However, under many circumstances, the ability to repudiate messages or deny a conversation i...
Ian Goldberg, Berkant Ustaoglu, Matthew Van Gundy,...