Sciweavers

2652 search results - page 271 / 531
» Privacy-preserving linear programming
Sort
View
119
Voted
ICDE
2008
IEEE
161views Database» more  ICDE 2008»
15 years 10 months ago
On the semantics and evaluation of top-k queries in probabilistic databases
We formulate three intuitive semantic properties for topk queries in probabilistic databases, and propose GlobalTopk query semantics which satisfies all of them. We provide a dyn...
Xi Zhang, Jan Chomicki
108
Voted
AAIM
2008
Springer
90views Algorithms» more  AAIM 2008»
15 years 10 months ago
Facility Location Problems: A Parameterized View
Facility Location can be seen as a whole family of problems which have many obvious applications in economics. They have been widely explored in the Operations Research community, ...
Michael R. Fellows, Henning Fernau
114
Voted
ICC
2007
IEEE
15 years 10 months ago
p-Cycle Network Design for Specified Minimum Dual-Failure Restorability
— Dual-failure scenarios are a real possibility in today’s optical networks and it is becoming more and more important for carriers and network operators to consider them when ...
Wei Li, John Doucette, Ming Zuo
129
Voted
LION
2007
Springer
100views Optimization» more  LION 2007»
15 years 9 months ago
Nested Partitioning for the Minimum Energy Broadcast Problem
The problem of finding the broadcast scheme with minimum power consumption in a wireless ad-hoc network is NP-hard. This work presents a new hybrid algorithm to solve this problem...
Sameh Al-Shihabi, Peter Merz, Steffen Wolf
123
Voted
SAT
2007
Springer
126views Hardware» more  SAT 2007»
15 years 9 months ago
Sensor Deployment for Failure Diagnosis in Networked Aerial Robots: A Satisfiability-Based Approach
Unmanned aerial vehicles (UAVs) represent an important class of networked robotic applications that must be both highly dependable and autonomous. This paper addresses sensor deplo...
Fadi A. Aloul, Nagarajan Kandasamy