Sciweavers

8016 search results - page 1451 / 1604
» On the practical genetic algorithms
Sort
View
CADE
2005
Springer
16 years 5 days ago
A Proof-Producing Decision Procedure for Real Arithmetic
We present a fully proof-producing implementation of a quantifier elimination procedure for real closed fields. To our knowledge, this is the first generally useful proof-producing...
Sean McLaughlin, John Harrison
SIGMOD
2008
ACM
89views Database» more  SIGMOD 2008»
16 years 21 hour ago
Towards identity anonymization on graphs
The proliferation of network data in various application domains has raised privacy concerns for the individuals involved. Recent studies show that simply removing the identities ...
Kun Liu, Evimaria Terzi
PODS
2008
ACM
174views Database» more  PODS 2008»
16 years 5 hour ago
Epistemic privacy
We present a novel definition of privacy in the framework of offline (retroactive) database query auditing. Given information about the database, a description of sensitive data, ...
Alexandre V. Evfimievski, Ronald Fagin, David P. W...
PODS
2008
ACM
109views Database» more  PODS 2008»
16 years 5 hour ago
Time-decaying aggregates in out-of-order streams
Processing large data streams is now a major topic in data management. The data involved can be truly massive, and the required analyses complex. In a stream of sequential events ...
Graham Cormode, Flip Korn, Srikanta Tirthapura
EDBT
2006
ACM
179views Database» more  EDBT 2006»
16 years 4 hour ago
TrajPattern: Mining Sequential Patterns from Imprecise Trajectories of Mobile Objects
Abstract. Mobile objects have become ubiquitous in our everyday lives, ranging from cellular phones to sensors, therefore, analyzing and mining mobile data becomes an interesting p...
Jiong Yang, Meng Hu
« Prev « First page 1451 / 1604 Last » Next »