Sciweavers

25316 search results - page 4738 / 5064
» Computational sensor networks
Sort
View
SIGMOD
2011
ACM
179views Database» more  SIGMOD 2011»
14 years 7 months ago
No free lunch in data privacy
Differential privacy is a powerful tool for providing privacypreserving noisy query answers over statistical databases. It guarantees that the distribution of noisy query answers...
Daniel Kifer, Ashwin Machanavajjhala
CIKM
2011
Springer
14 years 4 months ago
Building directories for social tagging systems
Today, a number of algorithms exist for constructing tag hierarchies from social tagging data. While these algorithms were designed with ontological goals in mind, we know very li...
Denis Helic, Markus Strohmaier
SIGCOMM
2012
ACM
13 years 7 months ago
Finishing flows quickly with preemptive scheduling
Today’s data centers face extreme challenges in providing low latency. However, fair sharing, a principle commonly adopted in current congestion control protocols, is far from o...
Chi-Yao Hong, Matthew Caesar, Brighten Godfrey
SODA
2012
ACM
297views Algorithms» more  SODA 2012»
13 years 7 months ago
Constant factor approximation algorithm for the knapsack median problem
We give a constant factor approximation algorithm for the following generalization of the k-median problem. We are given a set of clients and facilities in a metric space. Each fa...
Amit Kumar
ICDE
2009
IEEE
127views Database» more  ICDE 2009»
16 years 6 months ago
SbQA: A Self-Adaptable Query Allocation Process
We present a flexible query allocation framework, called Satisfaction-based Query Allocation (SbQA for short), for distributed information systems where both consumers and provider...
Jorge-Arnulfo Quiané-Ruiz, Patrick Valdurie...
« Prev « First page 4738 / 5064 Last » Next »