Sciweavers

128 search results - page 19 / 26
» Comparing top k lists
Sort
View
CRYPTO
2009
Springer
82views Cryptology» more  CRYPTO 2009»
14 years 1 months ago
Solving Hidden Number Problem with One Bit Oracle and Advice
In the Hidden Number Problem (HNP), the goal is to find a hidden number s, when given p, g and access to an oracle that on query a returns the k most significant bits of s · ga ...
Adi Akavia
FPGA
2004
ACM
163views FPGA» more  FPGA 2004»
13 years 11 months ago
Time and area efficient pattern matching on FPGAs
Pattern matching for network security and intrusion detection demands exceptionally high performance. Much work has been done in this field, and yet there is still significant roo...
Zachary K. Baker, Viktor K. Prasanna
EDBT
2002
ACM
129views Database» more  EDBT 2002»
14 years 7 months ago
Schema-Driven Evaluation of Approximate Tree-Pattern Queries
Abstract. We present a simple query language for XML, which supports hierarchical, Boolean-connected query patterns. The interpretation of a query is founded on cost-based query tr...
Torsten Schlieder
ASSETS
2006
ACM
14 years 1 months ago
From letters to words: efficient stroke-based word completion for trackball text entry
We present a major extension to our previous work on Trackball EdgeWrite—a unistroke text entry method for trackballs—by taking it from a character-level technique to a word-l...
Jacob O. Wobbrock, Brad A. Myers
IPPS
2005
IEEE
14 years 29 days ago
A Hardware Acceleration Unit for MPI Queue Processing
With the heavy reliance of modern scientific applications upon the MPI Standard, it has become critical for the implementation of MPI to be as capable and as fast as possible. Th...
Keith D. Underwood, K. Scott Hemmert, Arun Rodrigu...