Sciweavers

46 search results - page 7 / 10
» Balanced Families of Perfect Hash Functions and Their Applic...
Sort
View
GIS
2004
ACM
14 years 8 months ago
Adaptive hierarchical RBF interpolation for creating smooth digital elevation models
This paper presents a fast algorithm for smooth digital elevation model interpolation and approximation from scattered elevation data. The global surface is reconstructed by subdi...
Joachim Pouderoux, Jean-Christophe Gonzato, Ireneu...
BIBM
2009
IEEE
206views Bioinformatics» more  BIBM 2009»
14 years 2 months ago
Application of Kernel Functions for Accurate Similarity Search in Large Chemical Databases
Background: Similaritysearch in chemical structure databases is an important problem with many applications in chemical genomics, drug design, and efficient chemical probe screeni...
Xiaohong Wang, Jun Huan, Aaron M. Smalter, Gerald ...
JNW
2006
120views more  JNW 2006»
13 years 7 months ago
An EMST Based Look-up Protocol for Peer to Peer Networks
-- Peer-to-peer systems and applications are distributed systems without any centralized control. P2P systems form the basis of several applications, such as file sharing systems a...
Tarun Bansal, Pankaj Ghanshani
EWSPT
2003
Springer
14 years 25 days ago
An Approach and Framework for Extensible Process Support System
The issue of building a Process Support System Environment (PSSE), or a family of PSEE, to make them interoperate or to use them to pilot applications or services requires new solu...
Jacky Estublier, Jorge Villalobos, Anh-Tuyet Le, S...
IACR
2011
107views more  IACR 2011»
12 years 7 months ago
Structure Preserving CCA Secure Encryption and Its Application to Oblivious Third Parties
In this paper we present the first public key encryption scheme that is structure preserving, i.e., our encryption scheme uses only algebraic operations. In particular it does not...
Jan Camenisch, Kristiyan Haralambiev, Markulf Kohl...