Sciweavers

7289 search results - page 1326 / 1458
» A Dependent Set Theory
Sort
View
PODS
2010
ACM
306views Database» more  PODS 2010»
14 years 1 months ago
Optimizing linear counting queries under differential privacy
Differential privacy is a robust privacy standard that has been successfully applied to a range of data analysis tasks. But despite much recent work, optimal strategies for answe...
Chao Li, Michael Hay, Vibhor Rastogi, Gerome Mikla...
PODS
2010
ACM
181views Database» more  PODS 2010»
14 years 1 months ago
Schema design for XML repositories: complexity and tractability
Abiteboul et al. initiated the systematic study of distributed XML documents consisting of several logical parts, possibly located on different machines. The physical distributio...
Wim Martens, Matthias Niewerth, Thomas Schwentick
HICSS
2002
IEEE
92views Biometrics» more  HICSS 2002»
14 years 1 months ago
Strategic 'Morphing' and the Survivability of E-commerce Firms
Over the past year, the shakeout in the electronic commerce marketplace has redirected the attention of entrepreneurs and investors from the funding hype surrounding Internet star...
Robert J. Kauffman, Bin Wang, Tim Miller
CIE
2010
Springer
14 years 28 days ago
Focusing in Asynchronous Games
Game semantics provides an interactive point of view on proofs, which enables one to describe precisely their dynamical behavior during cut elimination, by considering formulas as ...
Samuel Mimram
CSR
2010
Springer
14 years 28 days ago
Balancing Bounded Treewidth Circuits
Algorithmic tools for graphs of small treewidth are used to address questions in complexity theory. For both arithmetic and Boolean circuits, it is shown that any circuit of size ...
Maurice Jansen, Jayalal M. N. Sarma
« Prev « First page 1326 / 1458 Last » Next »