Sciweavers

1040 search results - page 208 / 208
» Revenue maximization through
Sort
View
SIGMOD
2012
ACM
220views Database» more  SIGMOD 2012»
11 years 9 months ago
GUPT: privacy preserving data analysis made easy
It is often highly valuable for organizations to have their data analyzed by external agents. However, any program that computes on potentially sensitive data risks leaking inform...
Prashanth Mohan, Abhradeep Thakurta, Elaine Shi, D...
INFOCOM
2012
IEEE
11 years 9 months ago
Truthful spectrum auction design for secondary networks
Abstract—Opportunistic wireless channel access by nonlicensed users has emerged as a promising solution for addressing the bandwidth scarcity challenge. Auctions represent a natu...
Yuefei Zhu, Baochun Li, Zongpeng Li
SODA
2012
ACM
240views Algorithms» more  SODA 2012»
11 years 9 months ago
Simultaneous approximations for adversarial and stochastic online budgeted allocation
Motivated by online ad allocation, we study the problem of simultaneous approximations for the adversarial and stochastic online budgeted allocation problem. This problem consists...
Vahab S. Mirrokni, Shayan Oveis Gharan, Morteza Za...
CVPR
2012
IEEE
11 years 9 months ago
Large-scale knowledge transfer for object localization in ImageNet
ImageNet is a large-scale database of object classes with millions of images. Unfortunately only a small fraction of them is manually annotated with bounding-boxes. This prevents ...
Matthieu Guillaumin, Vittorio Ferrari
CIVR
2006
Springer
131views Image Analysis» more  CIVR 2006»
13 years 10 months ago
Exploring the Synergy of Humans and Machines in Extreme Video Retrieval
We introduce an interface for efficient video search that exploits the human ability to quickly scan visual content, after automatic retrieval has arrange the images in expected or...
Alexander G. Hauptmann, Wei-Hao Lin, Rong Yan, Jun...