Sciweavers

200 search results - page 31 / 40
» Sketching valuation functions
Sort
View
STOC
2002
ACM
177views Algorithms» more  STOC 2002»
15 years 9 months ago
Similarity estimation techniques from rounding algorithms
A locality sensitive hashing scheme is a distribution on a family F of hash functions operating on a collection of objects, such that for two objects x, y, PrhF [h(x) = h(y)] = si...
Moses Charikar
BIRTHDAY
2005
Springer
15 years 3 months ago
Objective Bayesian Nets
I present a formalism that combines two methodologies: objective Bayesianism and Bayesian nets. According to objective Bayesianism, an agent’s degrees of belief (i) ought to sat...
Jon Williamson
SAC
2011
ACM
14 years 9 days ago
Software security aspects of Java-based mobile phones
More and more functionality is provided by mobile phones today; this trend will continue over the next years. However, with the increasing functionality new risks go along. This n...
Karsten Sohr, Tanveer Mustafa, Adrian Nowak
ICDE
1996
IEEE
120views Database» more  ICDE 1996»
15 years 10 months ago
Towards the Reverse Engineering of Denormalized Relational Databases
This paper describes a method to cope with denormalized relational schemas in a database reverse engineering process. We propose two main steps to irnprove the understanding of da...
Jean-Marc Petit, Farouk Toumani, Jean-Franç...
CHI
2009
ACM
15 years 10 months ago
Musink: composing music through augmented drawing
We focus on the creative use of paper in the music composition process, particularly the interaction between paper and end-user programming. When expressing musical ideas, compose...
Theophanis Tsandilas, Catherine Letondal, Wendy E....