Sciweavers

1207 search results - page 139 / 242
» Towards optimal k-anonymization
Sort
View
PPSN
2004
Springer
14 years 3 months ago
Dominance Based Crossover Operator for Evolutionary Multi-objective Algorithms
In spite of the recent quick growth of the Evolutionary Multi-objective Optimization (EMO) research field, there has been few trials to adapt the general variation operators to t...
Olga Rudenko, Marc Schoenauer
SDMW
2004
Springer
14 years 3 months ago
Experimental Analysis of Privacy-Preserving Statistics Computation
The recent investigation of privacy-preserving data mining and other kinds of privacy-preserving distributed computation has been motivated by the growing concern about the privacy...
Hiranmayee Subramaniam, Rebecca N. Wright, Zhiqian...
CDC
2009
IEEE
172views Control Systems» more  CDC 2009»
14 years 2 months ago
A dynamic boundary guarding problem with translating targets
Abstract— We introduce a problem in which a service vehicle seeks to defend a deadline (boundary) from dynamically arriving mobile targets. The environment is a rectangle and the...
Stephen L. Smith, Shaunak Dattaprasad Bopardikar, ...
VLSID
1999
IEEE
93views VLSI» more  VLSID 1999»
14 years 2 months ago
Spec-Based Repeater Insertion and Wire Sizing for On-chip Interconnect
Recently Lillis, et al. presented an elegant dynamic programming approach to RC interconnect delay optimization through driver sizing, repeater insertion, and, wire sizing which e...
Noel Menezes, Chung-Ping Chen
CISS
2007
IEEE
14 years 1 months ago
How Many Users should be Turned On in a Multi-Antenna Broadcast Channel
This paper considers broadcast channels with L antennas at the base station and m single-antenna users, where each user has perfect channel knowledge and the base station obtains c...
Wei Dai, Youjian Liu, Brian Rider