Sciweavers

4074 search results - page 703 / 815
» Defining Computational Aesthetics
Sort
View
STOC
2006
ACM
152views Algorithms» more  STOC 2006»
14 years 11 months ago
Private approximation of search problems
Many approximation algorithms have been presented in the last decades for hard search problems. The focus of this paper is on cryptographic applications, where it is desired to de...
Amos Beimel, Paz Carmi, Kobbi Nissim, Enav Weinreb
OSDI
2008
ACM
14 years 11 months ago
On the Impact of Disk Scrubbing on Energy Savings
The increasing use of computers for saving valuable data imposes stringent reliability constraints on storage systems. Reliability improvement via use of redundancy is a common pr...
Guanying Wang, Ali Raza Butt, Chris Gniady
ICALP
2009
Springer
14 years 11 months ago
Improved Algorithms for Latency Minimization in Wireless Networks
In the interference scheduling problem, one is given a set of n communication requests described by sourcedestination pairs of nodes from a metric space. The nodes correspond to d...
Alexander Fanghänel, Berthold Vöcking, T...
ICDE
2010
IEEE
568views Database» more  ICDE 2010»
14 years 11 months ago
Reverse Top-k Queries
Rank-aware query processing has become essential for many applications that return to the user only the top-k objects based on the individual user's preferences. Top-k queries...
Akrivi Vlachou, Christos Doulkeridis, Kjetil N&osl...
PERCOM
2004
ACM
14 years 10 months ago
Augmenting Film and Video Footage with Sensor Data
With the advent of tiny networked devices, Mark Weiser's vision of a world embedded with invisible computers is coming to age. Due to their small size and relative ease of dep...
Norman Makoto Su, Heemin Park, Eric Bostrom, Jeff ...