Sciweavers

125 search results - page 16 / 25
» Linear Cryptanalysis Using Multiple Approximations and FEAL
Sort
View
VLDB
1997
ACM
112views Database» more  VLDB 1997»
13 years 11 months ago
Selectivity Estimation Without the Attribute Value Independence Assumption
The result size of a query that involves multiple attributes from the same relation depends on these attributes’ joint data distribution,i.e., the frequencies of all combination...
Viswanath Poosala, Yannis E. Ioannidis
TON
1998
90views more  TON 1998»
13 years 7 months ago
Effective bandwidths with priorities
—The notion of effective bandwidths has provided a useful practical framework for connection admission control and capacity planning in high-speed communication networks. The ass...
Arthur W. Berger, Ward Whitt
ICCV
2007
IEEE
14 years 9 months ago
3-D Reconstruction from Sparse Views using Monocular Vision
We consider the task of creating a 3-d model of a large novel environment, given only a small number of images of the scene. This is a difficult problem, because if the images are...
Ashutosh Saxena, Min Sun, Andrew Y. Ng
SIGECOM
2004
ACM
96views ECommerce» more  SIGECOM 2004»
14 years 1 months ago
Expressive negotiation over donations to charities
When donating money to a (say, charitable) cause, it is possible to use the contemplated donation as negotiating material to induce other parties interested in the charity to dona...
Vincent Conitzer, Tuomas Sandholm
IJCAI
2003
13 years 9 months ago
Generalizing Plans to New Environments in Relational MDPs
A longstanding goal in planning research is the ability to generalize plans developed for some set of environments to a new but similar environment, with minimal or no replanning....
Carlos Guestrin, Daphne Koller, Chris Gearhart, Ne...