Sciweavers

1968 search results - page 308 / 394
» The Complexity of Valued Constraint Models
Sort
View
FC
2009
Springer
150views Cryptology» more  FC 2009»
15 years 4 months ago
Privacy-Preserving Information Markets for Computing Statistical Data
Abstract. Consider an “information market” where private and potentially sensitive data are collected, treated as commodity and processed into aggregated information with comme...
Aggelos Kiayias, Bülent Yener, Moti Yung
SAC
2005
ACM
15 years 3 months ago
LighTS: a lightweight, customizable tuple space supporting context-aware applications
The tuple space model inspired by Linda has recently been rediscovered by distributed middleware. Moreover, some researchers also applied it in the challenging scenarios involving...
Gian Pietro Picco, Davide Balzarotti, Paolo Costa
JACIII
2007
99views more  JACIII 2007»
14 years 9 months ago
Asymptotic Behavior of Linear Approximations of Pseudo-Boolean Functions
We study the problem of approximating pseudoBoolean functions by linear pseudo-Boolean functions. Pseudo-Boolean functions generalize ordinary Boolean functions by allowing the fu...
Guoli Ding, Robert F. Lax, Peter P. Chen, Jianhua ...
MICCAI
2006
Springer
15 years 10 months ago
The Entire Regularization Path for the Support Vector Domain Description
Abstract. The support vector domain description is a one-class classification method that estimates the shape and extent of the distribution of a data set. This separates the data ...
Karl Sjöstrand, Rasmus Larsen
SIGMOD
2005
ACM
119views Database» more  SIGMOD 2005»
15 years 10 months ago
DogmatiX Tracks down Duplicates in XML
Duplicate detection is the problem of detecting different entries in a data source representing the same real-world entity. While research abounds in the realm of duplicate detect...
Melanie Weis, Felix Naumann