Sciweavers

78 search results - page 13 / 16
» JHU Ad Hoc Experiments at CLEF 2008
Sort
View
PVLDB
2008
116views more  PVLDB 2008»
13 years 7 months ago
Anonymizing bipartite graph data using safe groupings
Private data often comes in the form of associations between entities, such as customers and products bought from a pharmacy, which are naturally represented in the form of a larg...
Graham Cormode, Divesh Srivastava, Ting Yu, Qing Z...
NOMS
2008
IEEE
14 years 1 months ago
Dynamic inter-organizational cooperation setup in Circle-of-Trust environments
—The need for collaborative service provisioning across different providers’ domains is being addressed by Circles of Trust (CoT), whose members adhere to the same policies and...
Latifa Boursas, Vitalian A. Danciu
DEXA
2008
Springer
98views Database» more  DEXA 2008»
13 years 9 months ago
REALM: Replication of Data for a Logical Group Based MANET Database
Abstract. Mobile Ad-Hoc Networks, or MANETs, provide communication between free-roaming mobile hosts without a fixed infrastructure. These MANETs operate under conditions of limite...
Anita Vallur, Le Gruenwald, Nick Hunter
NIPS
2008
13 years 9 months ago
Hierarchical Fisher Kernels for Longitudinal Data
We develop new techniques for time series classification based on hierarchical Bayesian generative models (called mixed-effect models) and the Fisher kernel derived from them. A k...
Zhengdong Lu, Todd K. Leen, Jeffrey Kaye
SIAMJO
2000
74views more  SIAMJO 2000»
13 years 7 months ago
A Specialized Interior-Point Algorithm for Multicommodity Network Flows
Abstract. Despite the efficiency shown by interior-point methods in large-scale linear programming, they usually perform poorly when applied to multicommodity flow problems. The ne...
Jordi Castro