Sciweavers

549 search results - page 53 / 110
» On the Complexity of Restricted k-anonymity Problem
Sort
View
JMLR
2008
117views more  JMLR 2008»
14 years 10 months ago
Active Learning by Spherical Subdivision
We introduce a computationally feasible, "constructive" active learning method for binary classification. The learning algorithm is initially formulated for separable cl...
Falk-Florian Henrich, Klaus Obermayer
WG
2010
Springer
14 years 8 months ago
Computing the Cutwidth of Bipartite Permutation Graphs in Linear Time
The problem of determining the cutwidth of a graph is a notoriously hard problem which remains NP-complete under severe restrictions on input graphs. Until recently, non-trivial p...
Pinar Heggernes, Pim van 't Hof, Daniel Lokshtanov...
TOPLAS
2008
81views more  TOPLAS 2008»
14 years 9 months ago
Size-change termination with difference constraints
lem of inferring termination from such abstract information is not the halting problem for programs and may well be decidable. If this is the case, the decision algorithm forms a &...
Amir M. Ben-Amram
PDPTA
2010
14 years 7 months ago
Disciplined Multi-core Programming in C
The problem of programmability on modern heterogeneous multicore and future manycore embedded platforms is still not solved satisfactorily: although many existing but incompatible ...
Pjotr Kourzanov, Orlando Moreira, Henk J. Sips
PKDD
2010
Springer
141views Data Mining» more  PKDD 2010»
14 years 7 months ago
On Detecting Clustered Anomalies Using SCiForest
Detecting local clustered anomalies is an intricate problem for many existing anomaly detection methods. Distance-based and density-based methods are inherently restricted by their...
Fei Tony Liu, Kai Ming Ting, Zhi-Hua Zhou