Sciweavers

1095 search results - page 119 / 219
» Preprocessing of Intractable Problems
Sort
View
CP
2009
Springer
14 years 11 months ago
Constraint-Based Optimal Testing Using DNNF Graphs
The goal of testing is to distinguish between a number of hypotheses about a systemfor example, dierent diagnoses of faults by applying input patterns and verifying or falsifying t...
Anika Schumann, Martin Sachenbacher, Jinbo Huang
VLDB
2007
ACM
137views Database» more  VLDB 2007»
14 years 10 months ago
Improving Data Quality: Consistency and Accuracy
Two central criteria for data quality are consistency and accuracy. Inconsistencies and errors in a database often emerge as violations of integrity constraints. Given a dirty dat...
Gao Cong, Wenfei Fan, Floris Geerts, Xibei Jia, Sh...
ICS
2010
Tsinghua U.
14 years 7 months ago
Robustness of the Learning with Errors Assumption
: Starting with the work of Ishai-Sahai-Wagner and Micali-Reyzin, a new goal has been set within the theory of cryptography community, to design cryptographic primitives that are s...
Shafi Goldwasser, Yael Kalai, Chris Peikert, Vinod...
WWW
2010
ACM
14 years 5 months ago
Antourage: mining distance-constrained trips from flickr
We study how to automatically extract tourist trips from large volumes of geo-tagged photographs. Working with more than 8 million of these photographs that are publicly available...
Saral Jain, Stephan Seufert, Srikanta J. Bedathur
SAC
2010
ACM
14 years 5 months ago
Botzilla: detecting the "phoning home" of malicious software
Hosts infected with malicious software, so called malware, are ubiquitous in today’s computer networks. The means whereby malware can infiltrate a network are manifold and rang...
Konrad Rieck, Guido Schwenk, Tobias Limmer, Thorst...