Sciweavers

561 search results - page 12 / 113
» A Strategy for the Computation of Conditional Answers
Sort
View
PODS
2010
ACM
306views Database» more  PODS 2010»
14 years 29 days ago
Optimizing linear counting queries under differential privacy
Differential privacy is a robust privacy standard that has been successfully applied to a range of data analysis tasks. But despite much recent work, optimal strategies for answe...
Chao Li, Michael Hay, Vibhor Rastogi, Gerome Mikla...
ICARIS
2010
Springer
13 years 9 months ago
Defining a Simulation Strategy for Cancer Immunocompetence
Although there are various types of cancer treatments, none of these currently take into account the effect of ageing of the immune system and hence altered responses to cancer. R...
Grazziela P. Figueredo, Uwe Aickelin
ISEUD
2009
Springer
14 years 2 months ago
Males' and Females' Script Debugging Strategies
Little research has addressed IT professionals’ script debugging strategies, or considered whether there may be gender differences in these strategies. What strategies do male an...
Valentina Grigoreanu, James Brundage, Eric Bahna, ...
ICPP
2007
IEEE
14 years 2 months ago
SOR: A Static File Assignment Strategy Immune to Workload Characteristic Assumptions in Parallel I/O Systems
The problem of statically assigning nonpartitioned files in a parallel I/O system has been extensively investigated. A basic workload characteristic assumption of existing solutio...
Tao Xie 0004
IPPS
2007
IEEE
14 years 2 months ago
Replication Strategy in Unstructured Peer-to-Peer Systems
1 The unstructured Peer-to-Peer (P2P) systems usually use a “blind search” method to find the requested data object by propagating a query to a number of peers randomly. In or...
Guofu Feng, Yuquan Jiang, Guihai Chen, Qing Gu, Sa...