Sciweavers

2150 search results - page 123 / 430
» On a restricted cross-intersection problem
Sort
View
122
Voted
AEI
2007
91views more  AEI 2007»
15 years 5 months ago
MICF: An effective sanitization algorithm for hiding sensitive patterns on data mining
Data mining mechanisms have widely been applied in various businesses and manufacturing companies across many industry sectors. Sharing data or sharing mined rules has become a tr...
Yu-Chiang Li, Jieh-Shan Yeh, Chin-Chen Chang
CORR
2008
Springer
141views Education» more  CORR 2008»
15 years 5 months ago
Model checking memoryful linear-time logics over one-counter automata
We study complexity of the model-checking problems for LTL with registers (also known as freeze LTL and written LTL ) and for first-order logic with data equality tests (written F...
Stéphane Demri, Ranko Lazic, Arnaud Sangnie...
ALGORITHMICA
2002
84views more  ALGORITHMICA 2002»
15 years 4 months ago
On-Line Multi-Threaded Paging
In this paper we introduce a generalization of Paging to the case where there are many threads of requests. This models situations in which the requests come from more than one ind...
Esteban Feuerstein, Alejandro Strejilevich de Loma
ICDE
2008
IEEE
142views Database» more  ICDE 2008»
16 years 6 months ago
A Motion-Aware Approach to Continuous Retrieval of 3D Objects
Abstract-- With recent advances in mobile computing technologies, mobile devices can now render 3D objects realistically. Many users of these devices such as tourists, mixed-realit...
Mohammed Eunus Ali, Rui Zhang, Egemen Tanin, Lars ...
STOC
2006
ACM
114views Algorithms» more  STOC 2006»
16 years 5 months ago
Linear time low tree-width partitions and algorithmic consequences
Classes of graphs with bounded expansion have been introduced in [15], [12]. They generalize both proper minor closed classes and classes with bounded degree. For any class with b...
Jaroslav Nesetril, Patrice Ossona de Mendez