Sciweavers

6598 search results - page 1282 / 1320
» Graph Theory with Applications
Sort
View
WPES
2003
ACM
15 years 9 months ago
Anonymous credentials with biometrically-enforced non-transferability
We present a model and protocol for anonymous credentials. Rather than using deterrents to ensure non-transferability, our model uses secure hardware with biometric authentication...
Russell Impagliazzo, Sara Miner More
ATAL
2003
Springer
15 years 9 months ago
Evolving social rationality for MAS using "tags"
Endowing agents with “social rationality” [10, 12, 11] can aid overall efficiency in tasks where cooperation is beneficial to system level performance. However it is difficult...
David Hales, Bruce Edmonds
LATIN
2010
Springer
15 years 9 months ago
Prize-Collecting Steiner Networks via Iterative Rounding
In this paper we design an iterative rounding approach for the classic prize-collecting Steiner forest problem and more generally the prize-collecting survivable Steiner network de...
MohammadTaghi Hajiaghayi, Arefeh A. Nasri
PODS
2010
ACM
215views Database» more  PODS 2010»
15 years 9 months ago
An optimal algorithm for the distinct elements problem
We give the first optimal algorithm for estimating the number of distinct elements in a data stream, closing a long line of theoretical research on this problem begun by Flajolet...
Daniel M. Kane, Jelani Nelson, David P. Woodruff
PODS
2010
ACM
306views Database» more  PODS 2010»
15 years 9 months ago
Optimizing linear counting queries under differential privacy
Differential privacy is a robust privacy standard that has been successfully applied to a range of data analysis tasks. But despite much recent work, optimal strategies for answe...
Chao Li, Michael Hay, Vibhor Rastogi, Gerome Mikla...
« Prev « First page 1282 / 1320 Last » Next »