Sciweavers

1416 search results - page 257 / 284
» Optimizing Write Performance for Read Optimized Databases
Sort
View
WCRE
1997
IEEE
13 years 11 months ago
Reverse Engineering is Reverse Forward Engineering
Reverse Engineering is focused on the challenging task of understanding legacy program code without having suitable documentation. Using a transformational forward engineering per...
Ira D. Baxter, Michael Mehlich
AAAI
2007
13 years 10 months ago
Gender-Sensitive Automated Negotiators
This paper introduces an innovative approach for automated negotiating using the gender of human opponents. Our approach segments the information acquired from previous opponents,...
Ron Katz, Sarit Kraus
AAAI
2008
13 years 10 months ago
Dimension Amnesic Pyramid Match Kernel
With the success of local features in object recognition, feature-set representations are widely used in computer vision and related domains. Pyramid match kernel (PMK) is an effi...
Yi Liu, Xulei Wang, Hongbin Zha
NIPS
2008
13 years 9 months ago
Privacy-preserving logistic regression
This paper addresses the important tradeoff between privacy and learnability, when designing algorithms for learning from private databases. We focus on privacy-preserving logisti...
Kamalika Chaudhuri, Claire Monteleoni
ECIS
2003
13 years 9 months ago
A multi-model algorithm for the cost-oriented design of the information technology infrastructure
Multiple combinations of hardware and network components can be selected to design an information technology (IT) infrastructure that satisfies performance requirements. The profe...
Danilo Ardagna, Chiara Francalanci, Marco Trubian