Sciweavers

1843 search results - page 219 / 369
» Securing Class Initialization
Sort
View
114
Voted
FOCS
2008
IEEE
15 years 28 days ago
Market Equilibria in Polynomial Time for Fixed Number of Goods or Agents
We consider markets in the classical Arrow-Debreu model. There are n agents and m goods. Each buyer has a concave utility function (of the bundle of goods he/she buys) and an init...
Nikhil R. Devanur, Ravi Kannan
PR
2008
100views more  PR 2008»
15 years 22 days ago
Boundary based shape orientation
The computation of a shape's orientation is a common task in the area of computer vision and image processing, being used for example to define a local frame of reference and...
Jovisa D. Zunic, Milos Stojmenovic
ICMLC
2010
Springer
14 years 11 months ago
An integrity-based fuzzy c-means method resolving cluster size sensitivity problem
: Cluster size insensitive FCM (csiFCM) dynamically adjusts the membership value of each object based on the size of the cluster to which it is assigned after defuzzification to re...
Y. H. Lai, P. W. Huang, P. L. Lin
SCL
2011
14 years 3 months ago
Regularity issues for the null-controllability of the linear 1-d heat equation
The fact that the heat equation is controllable to zero in any bounded domain of the euclidean space, any time T > 0 and from any open subset of the boundary is well known. On ...
Sorin Micu, Enrique Zuazua
KDD
2006
ACM
128views Data Mining» more  KDD 2006»
16 years 1 months ago
Workload-aware anonymization
Protecting data privacy is an important problem in microdata distribution. Anonymization algorithms typically aim to protect individual privacy, with minimal impact on the quality...
Kristen LeFevre, David J. DeWitt, Raghu Ramakrishn...