Sciweavers

15254 search results - page 36 / 3051
» A k
Sort
View
VLDB
2005
ACM
114views Database» more  VLDB 2005»
14 years 4 months ago
Checking for k-Anonymity Violation by Views
When a private relational table is published using views, secrecy or privacy may be violated. This paper uses a formally-defined notion of k-anonymity to measure disclosure by vi...
Chao Yao, Xiaoyang Sean Wang, Sushil Jajodia
PEWASUN
2004
ACM
14 years 4 months ago
An M/MMGI/1/K queuing model for IEEE 802.11 ad hoc networks
An M/MMGI/1/K queuing model is developed for the analysis of IEEE 802.11 DCF using RTS/CTS. Results are based on arbitrary contention conditions, namely, collision probabilities, ...
Mustafa Özdemir, A. Bruce McDonald
PRICAI
2004
Springer
14 years 4 months ago
K2: Animated Agents that Understand Speech Commands and Perform Actions
This paper presents a prototype dialogue system, K2, in which a user can instruct agents through speech input to manipulate various objects in a 3-D virtual world. The agents’ ac...
Takenobu Tokugana, Kotaro Funakoshi, Hozumi Tanaka
FOCS
2002
IEEE
14 years 3 months ago
A Switching Lemma for Small Restrictions and Lower Bounds for k - DNF Resolution
d abstract) Nathan Segerlind∗ Sam Buss† Russell Impagliazzo‡ We prove a new switching lemma that works for restrictions that set only a small fraction of the variables and i...
Nathan Segerlind, Samuel R. Buss, Russell Impaglia...
ISLPED
1997
ACM
130views Hardware» more  ISLPED 1997»
14 years 2 months ago
K2: an estimator for peak sustainable power of VLSI circuits
New measures of peak power in the context of sequential circuits are proposed. This paper presents an automatic procedure to obtain very good lower bounds on these measures as wel...
Michael S. Hsiao, Elizabeth M. Rudnick, Janak H. P...