Sciweavers

662 search results - page 92 / 133
» A comparative benchmark of large objects in relational datab...
Sort
View
ICCAD
1997
IEEE
117views Hardware» more  ICCAD 1997»
13 years 12 months ago
Generalized matching from theory to application
This paper presents a novel approach for post-mapping optimization. We exploit the concept of generalized matching, a technique that nds symbolically all possible matching assignm...
Patrick Vuillod, Luca Benini, Giovanni De Micheli
SIGMOD
2005
ACM
119views Database» more  SIGMOD 2005»
14 years 7 months ago
DogmatiX Tracks down Duplicates in XML
Duplicate detection is the problem of detecting different entries in a data source representing the same real-world entity. While research abounds in the realm of duplicate detect...
Melanie Weis, Felix Naumann
ICMCS
2006
IEEE
112views Multimedia» more  ICMCS 2006»
14 years 1 months ago
Visual Feature Space Analysis for Unsupervised Effectiveness Estimation and Feature Engineering
The Feature Vector approach is one of the most popular schemes for managing multimedia data. For many data types such as audio, images, or 3D models, an abundance of different Fea...
Tobias Schreck, Daniel A. Keim, Christian Panse
DEXA
2009
Springer
127views Database» more  DEXA 2009»
14 years 2 months ago
The Real Performance Drivers behind XML Lock Protocols
Abstract. Fine-grained lock protocols should allow for highly concurrent transaction processing on XML document trees, which is addressed by the taDOM lock protocol family enabling...
Sebastian Bächle, Theo Härder
TCC
2012
Springer
218views Cryptology» more  TCC 2012»
12 years 3 months ago
Iterative Constructions and Private Data Release
In this paper we study the problem of approximately releasing the cut function of a graph while preserving differential privacy, and give new algorithms (and new analyses of exis...
Anupam Gupta, Aaron Roth, Jonathan Ullman