Sciweavers

9325 search results - page 1633 / 1865
» The decentralized implementability problem
Sort
View
129
Voted
SIGSOFT
2005
ACM
15 years 9 months ago
Detecting higher-level similarity patterns in programs
Cloning in software systems is known to create problems during software maintenance. Several techniques have been proposed to detect the same or similar code fragments in software...
Hamid Abdul Basit, Stan Jarzabek
130
Voted
CIKM
2005
Springer
15 years 9 months ago
Compact reachability labeling for graph-structured data
Testing reachability between nodes in a graph is a well-known problem with many important applications, including knowledge representation, program analysis, and more recently, bi...
Hao He, Haixun Wang, Jun Yang 0001, Philip S. Yu
139
Voted
ECML
2005
Springer
15 years 9 months ago
Kernel Basis Pursuit
ABSTRACT. Estimating a non-uniformly sampled function from a set of learning points is a classical regression problem. Kernel methods have been widely used in this context, but eve...
Vincent Guigue, Alain Rakotomamonjy, Stépha...
LOCA
2005
Springer
15 years 9 months ago
The GETA Sandals: A Footprint Location Tracking System
This paper presents the design, implementation, and evaluation of a footprintbased indoor location system on traditional Japanese GETA sandals. Our footprint location system can s...
Kenji Okuda, Shun-yuan Yeh, Chon-in Wu, Keng-hao C...
VLDB
2005
ACM
136views Database» more  VLDB 2005»
15 years 9 months ago
On k-Anonymity and the Curse of Dimensionality
In recent years, the wide availability of personal data has made the problem of privacy preserving data mining an important one. A number of methods have recently been proposed fo...
Charu C. Aggarwal
« Prev « First page 1633 / 1865 Last » Next »