Sciweavers

23589 search results - page 4571 / 4718
» Uncheatable Distributed Computations
Sort
View
ICDT
2010
ACM
211views Database» more  ICDT 2010»
15 years 7 months ago
Probabilistic Data Exchange
The work reported here lays the foundations of data exchange in the presence of probabilistic data. This requires rethinking the very basic concepts of traditional data exchange, ...
Ronald Fagin, Benny Kimelfeld, Phokion Kolaitis
SDM
2009
SIAM
180views Data Mining» more  SDM 2009»
15 years 7 months ago
Hierarchical Linear Discriminant Analysis for Beamforming.
This paper demonstrates the applicability of the recently proposed supervised dimension reduction, hierarchical linear discriminant analysis (h-LDA) to a well-known spatial locali...
Barry L. Drake, Haesun Park, Jaegul Choo
SDM
2009
SIAM
119views Data Mining» more  SDM 2009»
15 years 7 months ago
Twin Vector Machines for Online Learning on a Budget.
This paper proposes Twin Vector Machine (TVM), a constant space and sublinear time Support Vector Machine (SVM) algorithm for online learning. TVM achieves its favorable scaling b...
Zhuang Wang, Slobodan Vucetic
ICWS
2009
IEEE
15 years 7 months ago
Wrap Scientific Applications as WSRF Grid Services Using gRAVI
— Web service models are increasingly being used in the Grid community as way to create distributed applications exposing data and/or applications through self describing interfa...
Kyle Chard, Wei Tan, Joshua Boverhof, Ravi K. Madd...
EUROSYS
2009
ACM
15 years 7 months ago
Privacy-preserving browser-side scripting with BFlow
Some web sites provide interactive extensions using browser scripts, often without inspecting the scripts to verify that they are benign and bug-free. Others handle users’ conï¬...
Alexander Yip, Neha Narula, Maxwell N. Krohn, Robe...
« Prev « First page 4571 / 4718 Last » Next »