Sciweavers

1557 search results - page 75 / 312
» What can we do with a Solution
Sort
View
PVLDB
2010
95views more  PVLDB 2010»
13 years 8 months ago
Small Domain Randomization: Same Privacy, More Utility
Random perturbation is a promising technique for privacy preserving data mining. It retains an original sensitive value with a certain probability and replaces it with a random va...
Rhonda Chaytor, Ke Wang
PODC
1995
ACM
14 years 1 months ago
Knowledge-Based Programs
We show how solution concepts in games such as Nash equilibrium, correlated equilibrium, rationalizability, and sequential equilibrium can be given a uniform definition in terms ...
Ronald Fagin, Joseph Y. Halpern, Yoram Moses, Mosh...
SSDBM
2009
IEEE
116views Database» more  SSDBM 2009»
14 years 4 months ago
Constraint-Based Learning of Distance Functions for Object Trajectories
Abstract. With the drastic increase of object trajectory data, the analysis and exploration of trajectories has become a major research focus with many applications. In particular,...
Wei Yu, Michael Gertz
LREC
2008
91views Education» more  LREC 2008»
13 years 11 months ago
Classification Procedures for Software Evaluation
We outline a methodological classification for evaluation approaches of software in general. This classification was initiated partly owing to involvement in a biennial European c...
Muriel Amar, Sophie David, Rachel Panckhurst, Lisa...
ACCV
2007
Springer
14 years 4 months ago
Visual Odometry for Non-overlapping Views Using Second-Order Cone Programming
Abstract. We present a solution for motion estimation for a set of cameras which are firmly mounted on a head unit and do not have overlapping views in each image. This problem re...
Jae-Hak Kim, Richard I. Hartley, Jan-Michael Frahm...