Sciweavers

923 search results - page 179 / 185
» On the Computation of Relational View Complements
Sort
View
PODS
2010
ACM
306views Database» more  PODS 2010»
15 years 4 months ago
Optimizing linear counting queries under differential privacy
Differential privacy is a robust privacy standard that has been successfully applied to a range of data analysis tasks. But despite much recent work, optimal strategies for answe...
Chao Li, Michael Hay, Vibhor Rastogi, Gerome Mikla...
VRST
1999
ACM
15 years 4 months ago
Fast calibration for augmented reality
Augmented Reality overlays computer generated images over the real world. To correctly depict spatial relations between real and virtual objects, these images have to be generated...
Anton L. Fuhrmann, Dieter Schmalstieg, Werner Purg...
DATE
2006
IEEE
95views Hardware» more  DATE 2006»
15 years 3 months ago
Satisfiability-based framework for enabling side-channel attacks on cryptographic software
- Many electronic systems contain implementations of cryptographic algorithms in order to provide security. It is well known that cryptographic algorithms, irrespective of their th...
Nachiketh R. Potlapally, Anand Raghunathan, Srivat...
COLT
2008
Springer
15 years 1 months ago
Adapting to a Changing Environment: the Brownian Restless Bandits
In the multi-armed bandit (MAB) problem there are k distributions associated with the rewards of playing each of k strategies (slot machine arms). The reward distributions are ini...
Aleksandrs Slivkins, Eli Upfal
WSC
1998
15 years 1 months ago
Customer Interfacing - Lessons Learned
Customer interfacing is the process through which one works with and relates to their customer. Often in the technical world, modelers find it easier to interface with computers r...
David M. Ferrin, Richard P. Lavecchia