Sciweavers

2179 search results - page 330 / 436
» Symmetry within Solutions
Sort
View
87
Voted
PVLDB
2010
95views more  PVLDB 2010»
14 years 11 months ago
Small Domain Randomization: Same Privacy, More Utility
Random perturbation is a promising technique for privacy preserving data mining. It retains an original sensitive value with a certain probability and replaces it with a random va...
Rhonda Chaytor, Ke Wang
SCHEDULING
2010
74views more  SCHEDULING 2010»
14 years 11 months ago
Term-end exam scheduling at United States Military Academy/West Point
Scheduling term-end exams (TEE) at the United States Military Academy in West Point is unlike any other exam timetabling problem we know of. Exam timetabling normally produces a c...
Siqun Wang, Michael R. Bussieck, Monique Guignard,...
99
Voted
SDM
2010
SIAM
129views Data Mining» more  SDM 2010»
14 years 11 months ago
Cross-Selling Optimization for Customized Promotion
The profit of a retail product not only comes from its own sales, but also comes from its influence on the sales of other products. How to promote the right products to the righ...
Nan Li, Yinghui Yang, Xifeng Yan
SMR
2010
149views more  SMR 2010»
14 years 11 months ago
Capturing variability in business process models: the Provop approach
Usually, for a particular business process different variants exist. Each of them constitutes an adjustment of a reference process model to specific requirements building the proc...
Alena Hallerbach, Thomas Bauer, Manfred Reichert
TALG
2010
123views more  TALG 2010»
14 years 11 months ago
Lower-bounded facility location
We study the lower-bounded facility location problem, which generalizes the classical uncapacitated facility location problem in that it comes with lower bound constraints for the...
Zoya Svitkina