Sciweavers

541 search results - page 25 / 109
» Query Strategies for Priced Information
Sort
View
WPES
2005
ACM
15 years 5 months ago
The privacy cost of the second-chance offer
This paper examines a generalization of a two-stage game common on eBay: an ascending-price auction followed by price discrimination (the second chance offer). High bids in the a...
Sumit Joshi, Yu-An Sun, Poorvi L. Vora
WWW
2011
ACM
14 years 6 months ago
Query completion without query logs for song search
We describe a new method for query completion for Bollywood song search without using query logs. Since song titles in nonEnglish languages (Hindi in our case) are mostly present ...
Nitin Dua, Kanika Gupta, Monojit Choudhury, Kalika...
FOCS
2007
IEEE
15 years 6 months ago
Mechanism Design via Differential Privacy
We study the role that privacy-preserving algorithms, which prevent the leakage of specific information about participants, can play in the design of mechanisms for strategic age...
Frank McSherry, Kunal Talwar
SRDS
1999
IEEE
15 years 4 months ago
Information Dissemination in Partitionable Mobile Ad Hoc Networks
Ad-hoc wireless networks have no wired component, and may have unpredictable mobility pattern. Such networks can get partitioned and reconnected several times. One possible approa...
Goutham Karumanchi, Srinivasan Muralidharan, Ravi ...
WAIM
2001
Springer
15 years 4 months ago
A Mixed Data Dissemination Strategy for Mobile Computing Systems
Abstract. Broadcasting is a very effective technique to disseminate information to a massive number of clients when the data size is small. However, if the data size is large, the...
Guohong Cao, Yiqiong Wu, Bo Li