Sciweavers

2735 search results - page 282 / 547
» Comparing notions of randomness
Sort
View
SIBGRAPI
1999
IEEE
14 years 3 months ago
Deterministic Texture Analysis and Synthesis Using Tree Structure Vector Quantization
Texture analysis and synthesis is very important for computer graphics, vision, and image processing. This paper describes an algorithm which can produce new textures with a matchi...
Li-Yi Wei
VLDB
1998
ACM
132views Database» more  VLDB 1998»
14 years 3 months ago
Buffering and Read-Ahead Strategies for External Mergesort
The elapsed time for external mergesort is normally dominated by I/O time. This paper is focused on reducing I/O time during the merge phase. Three new buffering and readahead str...
Weiye Zhang, Per-Åke Larson
GCB
1997
Springer
77views Biometrics» more  GCB 1997»
14 years 3 months ago
Statistics of large scale sequence searching
Motivation: Database search programs such as FASTA, BLAST or a rigorous Smith–Waterman algorithm produce lists of database entries, which are assumed to be related to the query....
Rainer Spang, Martin Vingron
VLDB
1994
ACM
140views Database» more  VLDB 1994»
14 years 3 months ago
Efficient and Effective Clustering Methods for Spatial Data Mining
Spatial data mining is the discovery of interesting relationships and characteristics that may exist implicitly in spatial databases. In this paper, we explore whether clustering ...
Raymond T. Ng, Jiawei Han
CISC
2007
Springer
155views Cryptology» more  CISC 2007»
14 years 3 months ago
ECDSA-Verifiable Signcryption Scheme with Signature Verification on the Signcrypted Message
Abstract. In this paper, we propose a signcryption scheme which provides all the following properties at the same time. (1) forward security: the private key of a sender does not h...
Raylin Tso, Takeshi Okamoto, Eiji Okamoto