Sciweavers

4335 search results - page 853 / 867
» Privatizing Constraint Optimization
Sort
View
ATAL
2010
Springer
13 years 8 months ago
Worst-case efficiency ratio in false-name-proof combinatorial auction mechanisms
This paper analyzes the worst-case efficiency ratio of falsename-proof combinatorial auction mechanisms. False-nameproofness generalizes strategy-proofness by assuming that a bidd...
Atsushi Iwasaki, Vincent Conitzer, Yoshifusa Omori...
ACMDIS
2010
ACM
13 years 7 months ago
Incorporating user control in automated interactive scheduling systems
In this paper, we report our findings on the impact of providing users with varying degrees of control in an automated interactive scheduling system. While automated scheduling te...
Jina Huh, Martha E. Pollack, Hadi Katebi, Karem A....
MOBICOM
2010
ACM
13 years 7 months ago
Intentional networking: opportunistic exploitation of mobile network diversity
Mobile devices face a diverse and dynamic set of networking options. Using those options to the fullest requires knowledge of application intent. This paper describes Intentional ...
Brett D. Higgins, Azarias Reda, Timur Alperovich, ...
SIGMOD
2010
ACM
210views Database» more  SIGMOD 2010»
13 years 7 months ago
Searching trajectories by locations: an efficiency study
Trajectory search has long been an attractive and challenging topic which blooms various interesting applications in spatial-temporal databases. In this work, we study a new probl...
Zaiben Chen, Heng Tao Shen, Xiaofang Zhou, Yu Zhen...
ICDE
2010
IEEE
266views Database» more  ICDE 2010»
13 years 7 months ago
Ranking for data repairs
Abstract— Improving data quality is a time-consuming, laborintensive and often domain specific operation. A recent principled approach for repairing dirty database is to use dat...
Mohamed Yakout, Ahmed K. Elmagarmid, Jennifer Nevi...