Sciweavers

6020 search results - page 1101 / 1204
» A New Approach to Model Counting
Sort
View
133
Voted
PERCOM
2010
ACM
15 years 3 months ago
Social-K: Real-time K-anonymity guarantees for social network applications
—Traditional approaches to K-anonymity provide privacy guarantees over publicly released data sets with specified quasi-identifiers. However, the most common public releases of...
Aaron Beach, Mike Gartrell, Richard Han
PVLDB
2010
89views more  PVLDB 2010»
15 years 3 months ago
Transforming Range Queries To Equivalent Box Queries To Optimize Page Access
Range queries based on L1 distance are a common type of queries in multimedia databases containing feature vectors. We propose a novel approach that transforms the feature space i...
Sakti Pramanik, Alok Watve, Chad R. Meiners, Alex ...
PVLDB
2010
179views more  PVLDB 2010»
15 years 3 months ago
MRShare: Sharing Across Multiple Queries in MapReduce
Large-scale data analysis lies in the core of modern enterprises and scientific research. With the emergence of cloud computing, the use of an analytical query processing infrast...
Tomasz Nykiel, Michalis Potamias, Chaitanya Mishra...
SMC
2010
IEEE
144views Control Systems» more  SMC 2010»
15 years 3 months ago
Distance aware tag clouds
—Distance aware tag clouds add visualization of relations between terms to standard tag clouds. In addition to term importance (which is usually depicted through font size) the p...
Iris Adä, Kilian Thiel, Michael R. Berthold
169
Voted
WIOPT
2010
IEEE
15 years 2 months ago
A multiobjective performance evaluation framework for routing in wireless ad hoc networks
—Wireless ad hoc networks are seldom characterized by one single performance metric, yet the current literature lacks a flexible framework to assist in characterizing the design...
Katia Jaffrès-Runser, Mary R. Schurgot, Cri...
« Prev « First page 1101 / 1204 Last » Next »