Sciweavers

252 search results - page 43 / 51
» A Representation for Bit Section Based Analysis and Optimiza...
Sort
View
VLDB
2008
ACM
110views Database» more  VLDB 2008»
14 years 7 months ago
Enhancing histograms by tree-like bucket indices
Histograms are used to summarize the contents of relations into a number of buckets for the estimation of query result sizes. Several techniques (e.g., MaxDiff and V-Optimal) have ...
Francesco Buccafurri, Gianluca Lax, Domenico Sacc...
CORR
2010
Springer
116views Education» more  CORR 2010»
13 years 2 months ago
New Results on the Capacity of the Gaussian Cognitive Interference Channel
The capacity of the two-user Gaussian cognitive interference channel, a variation of the classical interference channel where one of the transmitters has knowledge of both messages...
Stefano Rini, Daniela Tuninetti, Natasha Devroye
CRYPTO
2005
Springer
110views Cryptology» more  CRYPTO 2005»
14 years 28 days ago
The Conditional Correlation Attack: A Practical Attack on Bluetooth Encryption
Motivated by the security of the nonlinear filter generator, the concept of correlation was previously extended to the conditional correlation, that studied the linear correlation...
Yi Lu 0002, Willi Meier, Serge Vaudenay
CONEXT
2008
ACM
13 years 9 months ago
Is there life in Second Life?
Abstract: Social virtual worlds such as Second Life are digital representations of the real world where human-controlled avatars evolve and interact through social activities. Unde...
Matteo Varvello, Fabio Picconi, Christophe Diot, E...
PAMI
2006
98views more  PAMI 2006»
13 years 7 months ago
Integral Invariants for Shape Matching
For shapes represented as closed planar contours, we introduce a class of functionals which are invariant with respect to the Euclidean group and which are obtained by performing i...
Siddharth Manay, Daniel Cremers, Byung-Woo Hong, A...