Sciweavers

3147 search results - page 543 / 630
» Statistically Hiding Sets
Sort
View
FAST
2010
15 years 4 days ago
Discovery of Application Workloads from Network File Traces
An understanding of application I/O access patterns is useful in several situations. First, gaining insight into what applications are doing with their data at a semantic level he...
Neeraja J. Yadwadkar, Chiranjib Bhattacharyya, K. ...
ATAL
2008
Springer
14 years 11 months ago
Strategyproof deterministic lotteries under broadcast communication
The design of deterministic and fair mechanisms for selection among a set of self-motivated agents based solely on these agents' input is a major challenge in multiagent syst...
Alon Altman, Moshe Tennenholtz
DGO
2008
126views Education» more  DGO 2008»
14 years 11 months ago
Active learning for e-rulemaking: public comment categorization
We address the e-rulemaking problem of reducing the manual labor required to analyze public comment sets. In current and previous work, for example, text categorization techniques...
Stephen Purpura, Claire Cardie, Jesse Simons
IADIS
2008
14 years 11 months ago
Sisa: Seeded Iterative Signature Algorithm for Biclustering Gene Expression Data
One approach to reduce the complexity of the task in the analysis of large scale genome-wide expression is to group the genes showing similar expression patterns into what are cal...
Neelima Gupta, Seema Aggarwal
SPIESR
2001
174views Database» more  SPIESR 2001»
14 years 11 months ago
Mapping low-level image features to semantic concepts
Humans tend to use high-level semantic concepts when querying and browsing multimedia databases; there is thus, a need for systems that extract these concepts and make available a...
Daniela Stan, Ishwar K. Sethi