Sciweavers

1438 search results - page 241 / 288
» A general formalism for the analysis of distributed algorith...
Sort
View
SIGECOM
2006
ACM
142views ECommerce» more  SIGECOM 2006»
14 years 1 months ago
Computing the optimal strategy to commit to
In multiagent systems, strategic settings are often analyzed under the assumption that the players choose their strategies simultaneously. However, this model is not always realis...
Vincent Conitzer, Tuomas Sandholm
STOC
2010
ACM
204views Algorithms» more  STOC 2010»
14 years 23 days ago
Interactive privacy via the median mechanism
We define a new interactive differentially private mechanism — the median mechanism — for answering arbitrary predicate queries that arrive online. Given fixed accuracy and...
Aaron Roth, Tim Roughgarden
WS
2004
ACM
14 years 1 months ago
SeRLoc: secure range-independent localization for wireless sensor networks
In many applications of wireless sensor networks (WSN), sensors are deployed un-tethered in hostile environments. For locationaware WSN applications, it is essential to ensure tha...
Loukas Lazos, Radha Poovendran
WWW
2008
ACM
14 years 8 months ago
Collaborative knowledge semantic graph image search
In this paper, we propose a Collaborative Knowledge Semantic Graphs Image Search (CKSGIS) system. It provides a novel way to conduct image search by utilizing the collaborative na...
Jyh-Ren Shieh, Yang-Ting Yeh, Chih-Hung Lin, Ching...
KDD
2005
ACM
125views Data Mining» more  KDD 2005»
14 years 8 months ago
Email data cleaning
Addressed in this paper is the issue of `email data cleaning' for text mining. Many text mining applications need take emails as input. Email data is usually noisy and thus i...
Jie Tang, Hang Li, Yunbo Cao, ZhaoHui Tang