Sciweavers

2652 search results - page 337 / 531
» Privacy-preserving linear programming
Sort
View
NETWORKING
2007
15 years 4 months ago
Optimization Models for the Radio Planning of Wireless Mesh Networks
In this paper we propose novel optimization models for the planning of Wireless Mesh Networks whose objective is to minimize the network installation cost, while providing full cov...
Edoardo Amaldi, Antonio Capone, Matteo Cesana, Fed...
AAAI
2006
15 years 4 months ago
Improved Bounds for Computing Kemeny Rankings
Voting (or rank aggregation) is a general method for aggregating the preferences of multiple agents. One voting rule of particular interest is the Kemeny rule, which minimizes the...
Vincent Conitzer, Andrew J. Davenport, Jayant Kala...
EMNLP
2006
15 years 4 months ago
Joint Extraction of Entities and Relations for Opinion Recognition
We present an approach for the joint extraction of entities and relations in the context of opinion recognition and analysis. We identify two types of opinion-related entities -- ...
Yejin Choi, Eric Breck, Claire Cardie
133
Voted
CATA
2003
15 years 4 months ago
Implementation and Performance Evaluation of Intel VTUNE Image Processing Functions in the MATLAB Environment
Many current general purpose processors use extensions to the instruction set architecture to enhance the performance of digital image processing and multimedia applications. In t...
Phaisit Chewputtanagul, David Jeff Jackson, Kennet...
PDPTA
2004
15 years 4 months ago
Evaluation of a Job Admission Algorithm for Bandwidth Constrained Grids
Abstract One of the goals envisioned by Grid computing is to make the execution of both computational and data-intensive problems possible. A key problem is finding the optimal set...
Marc De Leenheer, Pieter Thysebaert, Bruno Volckae...