Sciweavers

2681 search results - page 463 / 537
» Problem F
Sort
View
KDD
2007
ACM
153views Data Mining» more  KDD 2007»
14 years 10 months ago
Exploiting duality in summarization with deterministic guarantees
Summarization is an important task in data mining. A major challenge over the past years has been the efficient construction of fixed-space synopses that provide a deterministic q...
Panagiotis Karras, Dimitris Sacharidis, Nikos Mamo...
POPL
2006
ACM
14 years 10 months ago
Specifying C++ concepts
C++ templates are key to the design of current successful mainstream libraries and systems. They are the basis of programming techniques in diverse areas ranging from conventional...
Gabriel Dos Reis, Bjarne Stroustrup
STOC
2005
ACM
150views Algorithms» more  STOC 2005»
14 years 10 months ago
Correcting errors without leaking partial information
This paper explores what kinds of information two parties must communicate in order to correct errors which occur in a shared secret string W. Any bits they communicate must leak ...
Yevgeniy Dodis, Adam Smith
ICFP
2005
ACM
14 years 10 months ago
Recursive type generativity
Existential types provide a simple and elegant foundation for uning generative abstract data types, of the kind supported by the Standard ML module system. However, in attempting ...
Derek Dreyer
ICDE
2010
IEEE
539views Database» more  ICDE 2010»
14 years 9 months ago
Impact of Disk Corruption on Open-Source DBMS
Abstract-- Despite the best intentions of disk and RAID manufacturers, on-disk data can still become corrupted. In this paper, we examine the effects of corruption on database mana...
Sriram Subramanian, Yupu Zhang, Rajiv Vaidyanathan...