Sciweavers

4894 search results - page 821 / 979
» The Guarding Problem - Complexity and Approximation
Sort
View
CGO
2007
IEEE
14 years 2 months ago
Code Compaction of an Operating System Kernel
General-purpose operating systems, such as Linux, are increasingly being used in embedded systems. Computational resources are usually limited, and embedded processors often have ...
Haifeng He, John Trimble, Somu Perianayagam, Saumy...
FOCS
2007
IEEE
14 years 2 months ago
Mechanism Design via Differential Privacy
We study the role that privacy-preserving algorithms, which prevent the leakage of specific information about participants, can play in the design of mechanisms for strategic age...
Frank McSherry, Kunal Talwar
FUZZIEEE
2007
IEEE
14 years 2 months ago
Decoding Trace Peak Behaviour - A Neuro-Fuzzy Approach
— DNA sequence basecalling is commonly regarded as a solved problem, despite significant error rates being reflected in inaccuracies in databases and genome annotations. This has...
David Thornley, Stavros Petridis
GLOBECOM
2007
IEEE
14 years 2 months ago
Optimizing P2P Streaming Throughput Under Peer Churning
Abstract— High-throughput P2P streaming relies on peer selection, the strategy a peer uses to select other peer(s) as its parent(s) of streaming. Although this problem has been t...
Yi Cui, Liang Dai, Yuan Xue
HICSS
2007
IEEE
131views Biometrics» more  HICSS 2007»
14 years 2 months ago
Ambiguities in Sketch-Based Interfaces
Sketch-based interaction is an intuitive, simple communication method. However, it has several critical aspects, due to difficulties during the interpretation step by the computer...
Danilo Avola, Maria Chiara Caschera, Fernando Ferr...