Sciweavers

1207 search results - page 55 / 242
» Towards optimal k-anonymization
Sort
View
ASPDAC
2001
ACM
185views Hardware» more  ASPDAC 2001»
14 years 2 months ago
Power optimization and management in embedded systems
Power-efficient design requires reducing power dissipation in all parts of the design and during all stages of the design process subject to constraints on the system performance ...
Massoud Pedram
AMW
2010
14 years 18 days ago
Robust Clustering of Data Streams using Incremental Optimization
Discovering the patterns in evolving data streams is a very important and challenging task. In many applications, it is useful to detect the dierent patterns evolving over time and...
Basheer Hawwash, Olfa Nasraoui
WIOPT
2005
IEEE
14 years 4 months ago
Towards an Understanding of EASE and Its Properties
We propose a model under which several inherent properties of the Exponential Age SEarch routing protocol can be derived. By making simpliļ¬cations on this model, we are able to ...
Stratis Ioannidis, Peter Marbach
BDA
2007
14 years 18 days ago
Towards Action-Oriented Continuous Queries in Pervasive Systems
Pervasive information systems give an overview of what digital environments should look like in the future. From a data-centric point of view, traditional databases have to be use...
Yann Gripay, Frédérique Laforest, Je...
JGO
2010
117views more  JGO 2010»
13 years 9 months ago
Machine learning problems from optimization perspective
Both optimization and learning play important roles in a system for intelligent tasks. On one hand, we introduce three types of optimization tasks studied in the machine learning l...
Lei Xu