Sciweavers

329 search results - page 36 / 66
» Setting up Exhausted Values
Sort
View
68
Voted
EDBT
2010
ACM
155views Database» more  EDBT 2010»
15 years 4 months ago
Reducing metadata complexity for faster table summarization
Since the visualization real estate puts stringent constraints on how much data can be presented to the users at once, table summarization is an essential tool in helping users qu...
K. Selçuk Candan, Mario Cataldi, Maria Luis...
76
Voted
AAAI
2007
15 years 10 hour ago
Concurrent Action Execution with Shared Fluents
Concurrent action execution is important for plan-length minimization. However, action specifications are often limited to avoid conflicts arising from precondition/effect inter...
Michael Buro, Alexander Kovarsky
DAGSTUHL
2007
14 years 11 months ago
Normtypologies
In this extended abstract I describe some norm typolgies developed within sociololgy and social philosophy. Using these typologies we can determine the bounderies of the different...
Harko Verhagen
COCO
2011
Springer
217views Algorithms» more  COCO 2011»
13 years 9 months ago
Noisy Interpolation of Sparse Polynomials, and Applications
Let f ∈ Fq[x] be a polynomial of degree d ≤ q/2. It is well-known that f can be uniquely recovered from its values at some 2d points even after some small fraction of the valu...
Shubhangi Saraf, Sergey Yekhanin
CORR
2010
Springer
110views Education» more  CORR 2010»
14 years 9 months ago
(Unconditional) Secure Multiparty Computation with Man-in-the-middle Attacks
In secure multi-party computation n parties jointly evaluate an n-variate function f in the presence of an adversary which can corrupt up till t parties. All honest parties are req...
Shailesh Vaya