Sciweavers

1006 search results - page 179 / 202
» What is this page known for
Sort
View
KDD
2007
ACM
186views Data Mining» more  KDD 2007»
14 years 9 months ago
An Ad Omnia Approach to Defining and Achieving Private Data Analysis
We briefly survey several privacy compromises in published datasets, some historical and some on paper. An inspection of these suggests that the problem lies with the nature of the...
Cynthia Dwork
POPL
2008
ACM
14 years 9 months ago
Relevance heuristics for program analysis
Relevance heuristics allow us to tailor a program analysis to a particular property to be verified. This in turn makes it possible to improve the precision of the analysis where n...
Kenneth L. McMillan
RECOMB
2005
Springer
14 years 9 months ago
Comparative Systems Biology of the Sporulation Initiation Network in Prokaryotes
Many years of experimental and computational molecular biology of model organisms such as Escherichia coli and Saccharomyces cerevisiae has elucidated the gene regulatory network i...
Michiel J. L. de Hoon, Dennis Vitkup
EWSN
2008
Springer
14 years 8 months ago
Radio Characterization of 802.15.4 and Its Impact on the Design of Mobile Sensor Networks
Future mobile sensing systems are being designed using 802.15.4 low-power short-range radios for a diverse set of devices from embedded mobile motes to sensor-enabled cellphones in...
Emiliano Miluzzo, Xiao Zheng, Kristof Fodor, Andre...
SODA
2010
ACM
164views Algorithms» more  SODA 2010»
14 years 6 months ago
Differentially Private Approximation Algorithms
Consider the following problem: given a metric space, some of whose points are "clients," select a set of at most k facility locations to minimize the average distance f...
Anupam Gupta, Katrina Ligett, Frank McSherry, Aaro...