Sciweavers

549 search results - page 60 / 110
» On the Complexity of Restricted k-anonymity Problem
Sort
View
EDBT
2006
ACM
103views Database» more  EDBT 2006»
15 years 10 months ago
Finding Equivalent Rewritings in the Presence of Arithmetic Comparisons
The problem of rewriting queries using views has received significant attention because of its applications in a wide variety of datamanagement problems. For select-project-join SQ...
Foto N. Afrati, Rada Chirkova, Manolis Gergatsouli...
IEEESCC
2008
IEEE
15 years 4 months ago
A Secure Information Flow Architecture for Web Services
Current web service platforms (WSPs) often perform all web services-related processing, including securitysensitive information handling, in the same protection domain. Consequent...
Lenin Singaravelu, Jinpeng Wei, Calton Pu
GECCO
2009
Springer
15 years 4 months ago
On the scalability of XCS(F)
Many successful applications have proven the potential of Learning Classifier Systems and the XCS classifier system in particular in datamining, reinforcement learning, and func...
Patrick O. Stalph, Martin V. Butz, David E. Goldbe...
GECCO
2007
Springer
137views Optimization» more  GECCO 2007»
15 years 4 months ago
Extended probe method for linkage discovery over high-cardinality alphabets
The work addresses the problem of identifying the epistatic linkage of a function from high cardinality alphabets to the real numbers. It is a generalization of Heckendorn and Wri...
Shude Zhou, Zengqi Sun, Robert B. Heckendorn
ICDE
2008
IEEE
142views Database» more  ICDE 2008»
15 years 11 months ago
A Motion-Aware Approach to Continuous Retrieval of 3D Objects
Abstract-- With recent advances in mobile computing technologies, mobile devices can now render 3D objects realistically. Many users of these devices such as tourists, mixed-realit...
Mohammed Eunus Ali, Rui Zhang, Egemen Tanin, Lars ...