Sciweavers

157 search results - page 16 / 32
» An algorithmic characterization of multi-dimensional mechani...
Sort
View
EDBT
2008
ACM
154views Database» more  EDBT 2008»
14 years 7 months ago
Anonymity for continuous data publishing
k-anonymization is an important privacy protection mechanism in data publishing. While there has been a great deal of work in recent years, almost all considered a single static r...
Benjamin C. M. Fung, Ke Wang, Ada Wai-Chee Fu, Jia...
ALIFE
2000
13 years 7 months ago
Pattern Formation and Optimization in Army Ant Raids
Army ant colonies display complex foraging raid patterns involving thousands of individuals communicating through chemical trails. In this article we explore, by means of a simple ...
Ricard V. Solé, Eric Bonabeau, Jordi Delgad...
SOCO
2010
Springer
13 years 2 months ago
Taximeter verification with GPS and soft computing techniques
Until recently, local governments in Spain were using machines with rolling cylinders for verifying taximeters. However, the condition of the tires can lead to errors in the proces...
José Villar, Adolfo Otero, José Oter...
TITB
2010
148views Education» more  TITB 2010»
13 years 2 months ago
Coclustering for cross-subject fiber tract analysis through diffusion tensor imaging
Abstract--One of the fundamental goals of computational neuroscience is the study of anatomical features that reflect the functional organization of the brain. The study of physica...
Cui Lin, Darshan Pai, Shiyong Lu, Otto Muzik, Jing...
STOC
2007
ACM
169views Algorithms» more  STOC 2007»
14 years 8 months ago
Proportional response dynamics leads to market equilibrium
One of the main reasons of the recent success of peer to peer (P2P) file sharing systems such as BitTorrent is its built-in tit-for-tat mechanism. In this paper, we model the band...
Fang Wu, Li Zhang