Sciweavers

29152 search results - page 5811 / 5831
» A Model of Computation for MapReduce
Sort
View
151
Voted
SCN
2010
Springer
187views Communications» more  SCN 2010»
15 years 2 months ago
Searching Keywords with Wildcards on Encrypted Data
Abstract. A hidden vector encryption scheme (HVE) is a derivation of identity-based encryption, where the public key is actually a vector over a certain alphabet. The decryption ke...
Saeed Sedghi, Peter van Liesdonk, Svetla Nikova, P...
SIGMOD
2010
ACM
208views Database» more  SIGMOD 2010»
15 years 2 months ago
An automated, yet interactive and portable DB designer
Tuning tools attempt to configure a database to achieve optimal performance for a given workload. Selecting an optimal set of physical structures is computationally hard since it ...
Ioannis Alagiannis, Debabrata Dash, Karl Schnaitte...
127
Voted
SIMPRA
2010
110views more  SIMPRA 2010»
15 years 2 months ago
Singularity-free dynamic equations of vehicle-manipulator systems
In this paper we derive the singularity-free dynamic equations of vehiclemanipulator systems using a minimal representation. These systems are normally modeled using Euler angles,...
Pål Johan From, Vincent Duindam, Kristin Ytt...
133
Voted
TMI
2010
165views more  TMI 2010»
15 years 2 months ago
Spatio-Temporal Data Fusion for 3D+T Image Reconstruction in Cerebral Angiography
—This paper provides a framework for generating high resolution time sequences of 3D images that show the dynamics of cerebral blood flow. These sequences have the potential to ...
Andrew Copeland, Rami Mangoubi, Mukund N. Desai, S...
116
Voted
TPDS
2010
104views more  TPDS 2010»
15 years 2 months ago
From an Asynchronous Intermittent Rotating Star to an Eventual Leader
—Considering an asynchronous system made up of n processes and where up to t of them can crash, finding the weakest assumption that such a system has to satisfy for a common lea...
Antonio Fernández Anta, Michel Raynal
« Prev « First page 5811 / 5831 Last » Next »