Sciweavers

1418 search results - page 240 / 284
» A Theory of Stream Queries
Sort
View
IACR
2011
106views more  IACR 2011»
12 years 8 months ago
Hash Functions Based on Three Permutations: A Generic Security Analysis
We consider the family of 2n-to-n-bit compression functions that are solely based on at most three permutation executions and on XOR-operators, and analyze its collision and preima...
Bart Mennink, Bart Preneel
PODS
2009
ACM
124views Database» more  PODS 2009»
14 years 9 months ago
Indexing uncertain data
Querying uncertain data has emerged as an important problem in data management due to the imprecise nature of many measurement data. In this paper we study answering range queries...
Pankaj K. Agarwal, Siu-Wing Cheng, Yufei Tao, Ke Y...
CADE
2004
Springer
14 years 9 months ago
The ICS Decision Procedures for Embedded Deduction
contexts such as construction of abstractions, speed may be favored over completeness, so that undecidable theories (e.g., nonlinear integer arithmetic) and those whose decision pr...
Leonardo Mendonça de Moura, Sam Owre, Haral...
SIGIR
2005
ACM
14 years 2 months ago
Gravitation-based model for information retrieval
This paper proposes GBM (gravitation-based model), a physical model for information retrieval inspired by Newton’s theory of gravitation. A mapping is built in this model from c...
Shuming Shi, Ji-Rong Wen, Qing Yu, Ruihua Song, We...
ICDT
2003
ACM
150views Database» more  ICDT 2003»
14 years 2 months ago
Bioinformatics Adventures in Database Research
Informatics has helped launch molecular biology into the genomic era. It appears certain that informatics will remain a major contributor to molecular biology in the post-genome er...
Jinyan Li, See-Kiong Ng, Limsoon Wong