Sciweavers

43264 search results - page 8583 / 8653
» Comparing models of computation
Sort
View
SIGMOD
2010
ACM
170views Database» more  SIGMOD 2010»
14 years 2 months ago
Querying data provenance
Many advanced data management operations (e.g., incremental maintenance, trust assessment, debugging schema mappings, keyword search over databases, or query answering in probabil...
Grigoris Karvounarakis, Zachary G. Ives, Val Tanne...
APWEB
2010
Springer
14 years 2 months ago
Optimizing Query Processing for the Hidden Web
Abstract. The term Deep Web (sometimes also called Hidden Web) refers to the data content that is created dynamically as the result of a specific search on the Web. In this respec...
Andrea Calì, Davide Martinenghi
EUROCRYPT
2010
Springer
14 years 2 months ago
Adaptively Secure Broadcast
A broadcast protocol allows a sender to distribute a message through a point-to-point network to a set of parties, such that (i) all parties receive the same message, even if the s...
Martin Hirt, Vassilis Zikas
CDC
2009
IEEE
156views Control Systems» more  CDC 2009»
14 years 2 months ago
The nullspace method - a unifying paradigm to fault detection
— The nullspace method is a powerful framework to solve the synthesis problem of fault detection filters in the most general setting. It is also well suited to address the least...
András Varga
MM
2009
ACM
206views Multimedia» more  MM 2009»
14 years 2 months ago
Adaptive, selective, automatic tonal enhancement of faces
This paper presents an efficient, personalizable and yet completely automatic algorithm for enhancing the brightness, tonal balance, and contrast of faces in thumbnails of online...
Hrishikesh Aradhye, George Toderici, Jay Yagnik
« Prev « First page 8583 / 8653 Last » Next »