Sciweavers

3108 search results - page 181 / 622
» The Elements of Computer Credibility
Sort
View
ALGORITHMICA
1998
81views more  ALGORITHMICA 1998»
15 years 4 months ago
The List Update Problem: Improved Bounds for the Counter Scheme
We consider the problem of dynamic reorganization of a linear list, where requests for the elements are generated randomly with fixed, unknown probabilities. The objective is to ...
Hadas Shachnai, Micha Hofri
170
Voted
FECS
2009
122views Education» more  FECS 2009»
15 years 2 months ago
Design and Assessment of a Multidisciplinary Course in Service Oriented Architecture
- Service Oriented Architecture (SOA) is finding increasing acceptance in industry for the design of enterprise-scale, networked applications. However, opportunities to study SOA i...
Thomas Way, Vijay Gehlot
CISS
2010
IEEE
14 years 8 months ago
On the LASSO and Dantzig selector equivalence
—Recovery of sparse signals from noisy observations is a problem that arises in many information processing contexts. LASSO and the Dantzig selector (DS) are two well-known schem...
Muhammad Salman Asif, Justin K. Romberg
145
Voted
ICIP
2002
IEEE
16 years 6 months ago
Optimal protection assignment for scalable compressed images
This paper is concerned with the efficient transmission of scalable compressed images over lossy communication channels. Recent works have proposed several strategies for assignin...
Johnson Thie, David Taubman
ICDE
2008
IEEE
163views Database» more  ICDE 2008»
16 years 6 months ago
Approximate Joins for Data-Centric XML
In data integration applications, a join matches elements that are common to two data sources. Often, however, elements are represented slightly different in each source, so an app...
Nikolaus Augsten, Michael H. Böhlen, Curtis E...