Sciweavers

1282 search results - page 135 / 257
» Practical Loss-Resilient Codes
Sort
View
100
Voted
SDM
2007
SIAM
195views Data Mining» more  SDM 2007»
15 years 2 months ago
On Anonymization of String Data
String data is especially important in the privacy preserving data mining domain because most DNA and biological data is coded as strings. In this paper, we will discuss a new met...
Charu C. Aggarwal, Philip S. Yu
CLIMA
2006
15 years 2 months ago
Using Jason to Implement a Team of Gold Miners
This paper describes a team of agents that took part in the second CLIMA Contest. The team was implemented in a logic-based language for BDI agents and was run in a Java-based inte...
Rafael H. Bordini, Jomi Fred Hübner, Daniel M...
CORR
2010
Springer
113views Education» more  CORR 2010»
15 years 24 days ago
Gaussian Broadcast Channels with an Orthogonal and Bidirectional Cooperation Link
This paper considers a system where one transmitter broadcasts a single common message to two receivers linked by a bidirectional cooperation channel, which is assumed to be ortho...
Elena Veronica Belmega, Brice Djeumou, Samson Lasa...
96
Voted
CORR
2010
Springer
94views Education» more  CORR 2010»
15 years 24 days ago
The Power of Simple Tabulation Hashing
Randomized algorithms are often enjoyed for their simplicity, but the hash functions used to yield the desired theoretical guarantees are often neither simple nor practical. Here ...
Mihai Patrascu, Mikkel Thorup
96
Voted
ENTCS
2006
125views more  ENTCS 2006»
15 years 21 days ago
Estimating the Cost of Native Method Calls for Resource-bounded Functional Programming Languages
We address the problem of applying resource-bounded functional programming languages in practice on object-oriented virtual machines which include calls to native methods coded in...
Stephen T. Gilmore, Olha Shkaravska