Sciweavers

12264 search results - page 2190 / 2453
» Analysis of the rubberband algorithm
Sort
View
164
Voted
VLDB
1991
ACM
126views Database» more  VLDB 1991»
15 years 8 months ago
Deriving Production Rules for Incremental View Maintenance
It is widely recognized that production rules in database systems can be used to automatically maintain derived data such as views. However, writing a correct set of rules for e ci...
Stefano Ceri, Jennifer Widom
SIGCOMM
1994
ACM
15 years 8 months ago
MACAW: A Media Access Protocol for Wireless LAN's
In recent years, a wide variety of mobile computing devices has emerged, including portables, palmtops, and personal digit al assistants. Providing adequate network connectivity y...
Vaduvur Bharghavan, Alan J. Demers, Scott Shenker,...
ISBRA
2010
Springer
15 years 8 months ago
A Novel Approach for Compressing Phylogenetic Trees
Abstract. Phylogenetic trees are tree structures that depict relationships between organisms. Popular analysis techniques often produce large collections of candidate trees, which ...
Suzanne Matthews, Seung-Jin Sul, Tiffani L. Willia...
ACNS
2010
Springer
161views Cryptology» more  ACNS 2010»
15 years 8 months ago
Multi-trail Statistical Saturation Attacks
Abstract. Statistical Saturation Attacks have been introduced and applied to the block cipher PRESENT at CT-RSA 2009. In this paper, we consider their natural extensions. First, we...
Baudoin Collard, François-Xavier Standaert
141
Voted
ICPR
2010
IEEE
15 years 8 months ago
A Hypothesis Testing Approach for Fluorescent Blob Identification
Template matching is a common approach for identifying fluorescent objects within a biological image. But how to decide a threshold value for the purpose of justifying the goodness...
Le-Shin Wu, Sidney Shaw
« Prev « First page 2190 / 2453 Last » Next »