Sciweavers

200 search results - page 26 / 40
» Analyzing the Working Set Characteristics of Branch Executio...
Sort
View
PODS
1997
ACM
182views Database» more  PODS 1997»
13 years 12 months ago
A Cost Model For Nearest Neighbor Search in High-Dimensional Data Space
In this paper, we present a new cost model for nearest neighbor search in high-dimensional data space. We first analyze different nearest neighbor algorithms, present a generaliza...
Stefan Berchtold, Christian Böhm, Daniel A. K...
PRL
2006
85views more  PRL 2006»
13 years 7 months ago
Image segmentation based on merging of sub-optimal segmentations
In this paper a heuristic segmentation algorithm is presented based on the oversegmentation of an image. The method uses a set of different segmentations of the image produced pre...
Juan Carlos Pichel, David E. Singh, Francisco F. R...
IAT
2007
IEEE
14 years 2 months ago
Towards Automated Design of Multi-party Rational Exchange Security Protocols
It is only recently that rational exchange schemes have been considered as an alternative solution to the exchange problem. A rational exchange protocol cannot provide fairness bu...
Almudena Alcaide, Juan M. Estévez-Tapiador,...
IH
2005
Springer
14 years 1 months ago
Data Hiding in Compiled Program Binaries for Enhancing Computer System Performance
Abstract. Information hiding has been studied in many security applications such as authentication, copyright management and digital forensics. In this work, we introduce a new app...
Ashwin Swaminathan, Yinian Mao, Min Wu, Krishnan K...
JUCS
2010
134views more  JUCS 2010»
13 years 2 months ago
Systematic Management of Variability in UML-based Software Product Lines
Abstract: This paper presents SMarty, a variability management approach for UMLbased software product lines (PL). SMarty is supported by a UML profile, the SMartyProfile, and a pro...
Edson Alves de Oliveira Junior, Itana Maria de Sou...