Sciweavers

860 search results - page 69 / 172
» Lower Bounds on the Size of Test Data Sets
Sort
View
EDM
2008
129views Data Mining» more  EDM 2008»
13 years 9 months ago
Mining the Student Assessment Data: Lessons Drawn from a Small Scale Case Study
In this paper we describe an educational data mining (EDM) case study based on the data collected during the online assessment of students who were able to immediately receive tail...
Mykola Pechenizkiy, Toon Calders, Ekaterina Vasily...
ESA
2010
Springer
183views Algorithms» more  ESA 2010»
13 years 9 months ago
Spatio-temporal Range Searching over Compressed Kinetic Sensor Data
As sensor networks increase in size and number, efficient techniques are required to process the very large data sets that they generate. Frequently, sensor networks monitor object...
Sorelle A. Friedler, David M. Mount
ISAAC
2010
Springer
276views Algorithms» more  ISAAC 2010»
13 years 5 months ago
Anonymous Fuzzy Identity-Based Encryption for Similarity Search
Abstract. In this paper, we consider the problem of predicate encryption and focus on the predicate for testing whether the hamming distance between the attribute X of a data item ...
David W. Cheung, Nikos Mamoulis, W. K. Wong, Siu-M...
TCC
2012
Springer
218views Cryptology» more  TCC 2012»
12 years 3 months ago
Iterative Constructions and Private Data Release
In this paper we study the problem of approximately releasing the cut function of a graph while preserving differential privacy, and give new algorithms (and new analyses of exis...
Anupam Gupta, Aaron Roth, Jonathan Ullman
DATE
2003
IEEE
93views Hardware» more  DATE 2003»
14 years 1 months ago
Comparison of Test Pattern Decompression Techniques
Test pattern decompression techniques are bounded with the algorithm of test pattern ordering and test data flow controlling. Some of the methods could have more sophisticated sor...
Ondrej Novák