Sciweavers

7129 search results - page 1423 / 1426
» Approximation Algorithms for Treewidth
Sort
View
TKDE
2011
234views more  TKDE 2011»
13 years 2 months ago
The World in a Nutshell: Concise Range Queries
—With the advance of wireless communication technology, it is quite common for people to view maps or get related services from the handheld devices, such as mobile phones and PD...
Ke Yi, Xiang Lian, Feifei Li, Lei Chen 0002
TKDE
2011
133views more  TKDE 2011»
13 years 2 months ago
Collaborative Filtering with Personalized Skylines
— Collaborative filtering (CF) systems exploit previous ratings and similarity in user behavior to recommend the top-k objects/records which are potentially most interesting to t...
Ilaria Bartolini, Zhenjie Zhang, Dimitris Papadias
IHI
2010
197views Healthcare» more  IHI 2010»
13 years 2 months ago
Beyond safe harbor: automatic discovery of health information de-identification policy alternatives
Regulations in various countries permit the reuse of health information without patient authorization provided the data is "de-identified". In the United States, for ins...
Kathleen Benitez, Grigorios Loukides, Bradley Mali...
PROMISE
2010
13 years 2 months ago
Exploiting count spectra for Bayesian fault localization
Background: Automated diagnosis of software defects can drastically increase debugging efficiency, improving reliability and time-to-market. Current, low-cost, automatic fault dia...
Rui Abreu, Alberto González-Sanchez, Arjan ...
SIAMDM
2010
113views more  SIAMDM 2010»
13 years 2 months ago
The VPN Problem with Concave Costs
We consider the following network design problem. We are given an undirected network with costs on the edges, a set of terminals, and an upper bound for each terminal limiting the ...
Samuel Fiorini, Gianpaolo Oriolo, Laura Sanit&agra...
« Prev « First page 1423 / 1426 Last » Next »