Sciweavers

5344 search results - page 921 / 1069
» Privacy-Preserving Set Operations
Sort
View
142
Voted
ICDM
2003
IEEE
92views Data Mining» more  ICDM 2003»
15 years 8 months ago
Validating and Refining Clusters via Visual Rendering
Clustering is an important technique for understanding and analysis of large multi-dimensional datasets in many scientific applications. Most of clustering research to date has be...
Keke Chen, Ling Liu
ISMAR
2003
IEEE
15 years 8 months ago
Resolving Multiple Occluded Layers in Augmented Reality
A useful function of augmented reality (AR) systems is their ability to visualize occluded infrastructure directly in a user’s view of the environment. This is especially import...
Mark A. Livingston, J. Edward Swan II, Joseph L. G...
141
Voted
PLDI
2003
ACM
15 years 8 months ago
Meta optimization: improving compiler heuristics with machine learning
Compiler writers have crafted many heuristics over the years to approximately solve NP-hard problems efficiently. Finding a heuristic that performs well on a broad range of applic...
Mark Stephenson, Saman P. Amarasinghe, Martin C. M...
GI
2003
Springer
15 years 8 months ago
An Integrated Approach to Survivability Analysis of Large Complex Critical Infrastructures
: The integrated approach for analysis of Large Complex Critical Infrastructures (LCCIs) to afford survivability aimed at preparing a Roadmap for Research and Development for criti...
Sandro Bologna, Thomas Beer
123
Voted
ICALP
2003
Springer
15 years 8 months ago
Algorithmic Aspects of Bandwidth Trading
We study algorithmic problems that are motivated by bandwidth trading in next generation networks. Typically, bandwidth trading involves sellers (e.g., network operators) interest...
Randeep Bhatia, Julia Chuzhoy, Ari Freund, Joseph ...