Sciweavers

1207 search results - page 89 / 242
» Towards optimal k-anonymization
Sort
View
114
Voted
STOC
2005
ACM
133views Algorithms» more  STOC 2005»
16 years 1 months ago
An O(log n log log n) space algorithm for undirected st-connectivity
Abstract. We present a deterministic O(log n log log n) space algorithm for undirected stconnectivity. It is based on a space-efficient simulation of the deterministic EREW algorit...
Vladimir Trifonov
81
Voted
PPSN
2004
Springer
15 years 6 months ago
Exploring the Evolutionary Details of a Feasible-Infeasible Two-Population GA
Abstract. A two-population Genetic Algorithm for constrained optimization is exercised and analyzed. One population consists of feasible candidate solutions evolving toward optimal...
Steven Orla Kimbrough, Ming Lu, David Harlan Wood
AAAI
2008
15 years 3 months ago
Efficient Memoization for Dynamic Programming with Ad-Hoc Constraints
We address the problem of effective reuse of subproblem solutions in dynamic programming. In dynamic programming, a memoed solution of a subproblem can be reused for another if th...
Joxan Jaffar, Andrew E. Santosa, Razvan Voicu
103
Voted
AAAI
2000
15 years 2 months ago
Preventing Strategic Manipulation in Iterative Auctions: Proxy Agents and Price-Adjustment
Iterative auctions have many computational advantages over sealed-bid auctions, but can present new possibilities for strategic manipulation. We propose a two-stage technique to m...
David C. Parkes, Lyle H. Ungar
153
Voted
JMLR
2010
148views more  JMLR 2010»
14 years 7 months ago
A Generalized Path Integral Control Approach to Reinforcement Learning
With the goal to generate more scalable algorithms with higher efficiency and fewer open parameters, reinforcement learning (RL) has recently moved towards combining classical tec...
Evangelos Theodorou, Jonas Buchli, Stefan Schaal