Sciweavers

17983 search results - page 3270 / 3597
» Set Types and Applications
Sort
View
FOCS
2002
IEEE
15 years 10 months ago
Low-Dimensional Linear Programming with Violations
Two decades ago, Megiddo and Dyer showed that linear programming in two and three dimensions (and subsequently any constant number of dimensions) can be solved in linear time. In ...
Timothy M. Chan
145
Voted
SSIAI
2002
IEEE
15 years 10 months ago
Pre-Classification of Chest Radiographs for Improved Active Shape Model Segmentation of Ribs
The parenchymal and skeletal structure as recorded on chest radiographs can vary significantly from person to person. The person’s height, width, age, gender, and other factors ...
Janakiramanan Ramachandran, Marios S. Pattichis, P...
139
Voted
STOC
2010
ACM
227views Algorithms» more  STOC 2010»
15 years 10 months ago
On the Round Complexity of Covert Computation
In STOC’05, von Ahn, Hopper and Langford introduced the notion of covert computation. In covert computation, a party runs a secure computation protocol over a covert (or stegano...
Vipul Goyal and Abhishek Jain
SIGECOM
2010
ACM
170views ECommerce» more  SIGECOM 2010»
15 years 10 months ago
Optimal online assignment with forecasts
Motivated by the allocation problem facing publishers in display advertising we formulate the online assignment with forecast problem, a version of the online allocation problem w...
Erik Vee, Sergei Vassilvitskii, Jayavel Shanmugasu...
APN
2010
Springer
15 years 10 months ago
Wendy: A Tool to Synthesize Partners for Services
Service-oriented computing proposes services as building blocks which can be composed to complex systems. To reason about the correctness of a service, its communication protocol n...
Niels Lohmann, Daniela Weinberg
« Prev « First page 3270 / 3597 Last » Next »