Sciweavers

1169 search results - page 168 / 234
» Degrees of monotone complexity
Sort
View
FSE
1999
Springer
89views Cryptology» more  FSE 1999»
14 years 2 months ago
Slide Attacks
Recently a powerful cryptanalytic tool—the slide attack— was introduced [3]. Slide attacks are very successful in breaking iterative ciphers with a high degree of self-similari...
Alex Biryukov, David Wagner
GIS
1999
ACM
14 years 2 months ago
A Provably Efficient Computational Model for Approximate Spatiotemporal Retrieval
: The paper is concerned with the effective and efficient processing of spatiotemporal selection queries under varying degrees of approximation. Such queries may employ operators l...
Vasilis Delis, Christos Makris, Spyros Sioutas
ICMCS
1998
IEEE
86views Multimedia» more  ICMCS 1998»
14 years 2 months ago
Virtual Recovery of Excavated Archaeological Finds
This work aims at a virtual recovery of excavated archaeological finds in cyberspace for ancient relic preservation, archaeology research, and multimedia material generation. Many...
Jiang Yu Zheng, Zhong Li Zhang, Norihiro Abe
IPPS
1998
IEEE
14 years 2 months ago
Hyper Butterfly Network: A Scalable Optimally Fault Tolerant Architecture
Boundeddegreenetworks like deBruijn graphsor wrapped butterfly networks are very important from VLSI implementation point of view as well as for applications where the computing n...
Wei Shi, Pradip K. Srimani
VLDB
1998
ACM
180views Database» more  VLDB 1998»
14 years 2 months ago
nD-SQL: A Multi-Dimensional Language for Interoperability and OLAP
We propose a multi-dimensional language called nD-SQL with the following features: (i) nD-SQL supports queries that interoperate amongst multiple relational sources with heterogen...
Frédéric Gingras, Laks V. S. Lakshma...