Sciweavers

1207 search results - page 158 / 242
» Towards optimal k-anonymization
Sort
View
ICCD
2008
IEEE
420views Hardware» more  ICCD 2008»
14 years 6 months ago
Frequency and voltage planning for multi-core processors under thermal constraints
— Clock frequency and transistor density increases have resulted in elevated chip temperatures. In order to meet temperature constraints while still exploiting the performance op...
Michael Kadin, Sherief Reda
VLDB
2005
ACM
126views Database» more  VLDB 2005»
14 years 3 months ago
Consistently Estimating the Selectivity of Conjuncts of Predicates
Cost-based query optimizers need to estimate the selectivity of conjunctive predicates when comparing alternative query execution plans. To this end, advanced optimizers use multi...
Volker Markl, Nimrod Megiddo, Marcel Kutsch, Tam M...
GECCO
2003
Springer
107views Optimization» more  GECCO 2003»
14 years 2 months ago
Exploration of a Two Sided Rendezvous Search Problem Using Genetic Algorithms
The problem of searching for a walker that wants to be found, when the walker moves toward the helicopter when it can hear it, is an example of a two sided search problem which is ...
T. Q. S. Truong, A. Stacey
JETAI
2007
131views more  JETAI 2007»
13 years 9 months ago
A computational architecture for heterogeneous reasoning
Reasoning, problem solving, indeed the general process of acquiring knowledge, is not an isolated, homogenous affair involving a one agent using a single form of representation, b...
Dave Barker-Plummer, John Etchemendy
CVPR
2007
IEEE
14 years 11 months ago
Shape Representation and Registration using Vector Distance Functions
This paper introduces a new method for shape registration by matching vector distance functions. The vector distance function representation is more flexible than the conventional...
Hossam E. Abd El Munim, Aly A. Farag