Sciweavers

1207 search results - page 172 / 242
» Towards optimal k-anonymization
Sort
View
CF
2004
ACM
14 years 2 months ago
Predictable performance in SMT processors
Current instruction fetch policies in SMT processors are oriented towards optimization of overall throughput and/or fairness. However, they provide no control over how individual ...
Francisco J. Cazorla, Peter M. W. Knijnenburg, Riz...
SPAA
2003
ACM
14 years 2 months ago
On local algorithms for topology control and routing in ad hoc networks
An ad hoc network is a collection of wireless mobile hosts forming a temporary network without the aid of any fixed infrastructure. Indeed, an important task of an ad hoc network...
Lujun Jia, Rajmohan Rajaraman, Christian Scheidele...
ATAL
2003
Springer
14 years 2 months ago
Designing Self-Assembly for 2-Dimensional Building Blocks
In this paper we present a genetic algorithm-based approach towards designing self-assembling objects comprised of square smart blocks. Each edge of each block can have one of thr...
Ying Guo, Geoff Poulton, Philip Valencia, Geoff Ja...
SIGMOD
2010
ACM
211views Database» more  SIGMOD 2010»
14 years 1 months ago
Enterprise information extraction: recent developments and open challenges
Information extraction (IE) — the problem of extracting structured information from unstructured text — has become an increasingly important topic in recent years. A SIGMOD 20...
Laura Chiticariu, Yunyao Li, Sriram Raghavan, Fred...
CVPR
2007
IEEE
14 years 10 months ago
Adaptive Patch Features for Object Class Recognition with Learned Hierarchical Models
We present a hierarchical generative model for object recognition that is constructed by weakly-supervised learning. A key component is a novel, adaptive patch feature whose width...
Fabien Scalzo, Justus H. Piater