Sciweavers

8109 search results - page 1516 / 1622
» A Model of Component-Based Programming
Sort
View
WWW
2008
ACM
16 years 3 months ago
Sewnet -: a framework for creating services utilizing telecom functionality
With Telecom market reaching saturation in many geographies and revenues from voice calls decreasing, Telecom operators are trying to identify new sources of revenue. For this pur...
Sumit Mittal, Dipanjan Chakraborty, Sunil Goyal, S...
127
Voted
CHI
2004
ACM
16 years 3 months ago
Common sense investing: bridging the gap between expert and novice
In this paper, we describe Common Sense Investing (CSI), an interactive investment tool that uses a knowledge base of common sense statements in conjunction with domain knowledge ...
Ashwani Kumar, Sharad C. Sundararajan, Henry Liebe...
124
Voted
STOC
2006
ACM
149views Algorithms» more  STOC 2006»
16 years 2 months ago
Bounded-error quantum state identification and exponential separations in communication complexity
We consider the problem of bounded-error quantum state identification: given either state 0 or state 1, we are required to output `0', `1' or `?' ("don't ...
Dmitry Gavinsky, Julia Kempe, Oded Regev, Ronald d...
131
Voted
ICALP
2009
Springer
16 years 2 months ago
Dynamic Succinct Ordered Trees
Abstract. We study the problem of maintaining a dynamic tree succinctly, in 2n + o(n) bits, under updates of the following form: insertion or deletion of a leaf, insertion of a nod...
Arash Farzan, J. Ian Munro
123
Voted
ICALP
2009
Springer
16 years 2 months ago
Learning Halfspaces with Malicious Noise
We give new algorithms for learning halfspaces in the challenging malicious noise model, where an adversary may corrupt both the labels and the underlying distribution of examples....
Adam R. Klivans, Philip M. Long, Rocco A. Servedio
« Prev « First page 1516 / 1622 Last » Next »