Sciweavers

2190 search results - page 208 / 438
» Incomplete Information Processing for Optimization of Distri...
Sort
View
EDBT
2012
ACM
225views Database» more  EDBT 2012»
13 years 5 months ago
Differentially private search log sanitization with optimal output utility
Web search logs contain extremely sensitive data, as evidenced by the recent AOL incident. However, storing and analyzing search logs can be very useful for many purposes (i.e. in...
Yuan Hong, Jaideep Vaidya, Haibing Lu, Mingrui Wu
IIE
2007
120views more  IIE 2007»
15 years 3 months ago
Words are Silver, Mouse-Clicks are Gold? (or how to optimize the level of language formalization of young students in a Logo-bas
How do we teach children to express and communicate ideas in a formal and informal mode? What type of language do they need in a concrete context? How should they determine a prope...
Evgenia Sendova, Toni Chehlarova, Pavel Boytchev
ATAL
2009
Springer
15 years 9 months ago
Learning equilibria in repeated congestion games
While the class of congestion games has been thoroughly studied in the multi-agent systems literature, settings with incomplete information have received relatively little attenti...
Moshe Tennenholtz, Aviv Zohar
E4MAS
2006
Springer
15 years 6 months ago
Urban Traffic Control with Co-Fields
Traffic control can be regarded as a multiagent application in which car-agents and traffic-light-agents need to coordinate with each other to optimize the traffic flow and to avoi...
Marco Camurri, Marco Mamei, Franco Zambonelli
WISEC
2010
ACM
15 years 8 months ago
Privacy-preserving computation of benchmarks on item-level data using RFID
Currently, companies are about to optimize their internal processes by monitoring items they handle with Radio Frequency Identification (RFID). However, there is a risk that sens...
Florian Kerschbaum, Nina Oertel, Leonardo Weiss Fe...