Sciweavers

2913 search results - page 283 / 583
» How Much to Copy
Sort
View
JAL
1998
74views more  JAL 1998»
15 years 3 months ago
A Survey of Fast Exponentiation Methods
Public-key cryptographic systems often involve raising elements of some group (e.g. GF(2n), Z/NZ, or elliptic curves) to large powers. An important question is how fast this expon...
Daniel M. Gordon
SIGKDD
2002
93views more  SIGKDD 2002»
15 years 3 months ago
Randomization in Privacy-Preserving Data Mining
Suppose there are many clients, each having some personal information, and one server, which is interested only in aggregate, statistically significant, properties of this informa...
Alexandre V. Evfimievski
TRANSCI
2002
106views more  TRANSCI 2002»
15 years 3 months ago
The Stochastic Inventory Routing Problem with Direct Deliveries
Vendor managed inventory replenishment is a business practice in which vendors monitor their customers' inventories, and decide when and how much inventory should be replenis...
Anton J. Kleywegt, Vijay S. Nori, Martin W. P. Sav...
PVLDB
2008
71views more  PVLDB 2008»
15 years 3 months ago
Read-optimized databases, in depth
Recently, a number of papers have been published showing the benefits of column stores over row stores. However, the research comparing the two in an "apples-to-apples" ...
Allison L. Holloway, David J. DeWitt
IJCGA
2010
86views more  IJCGA 2010»
15 years 2 months ago
Leaving an Unknown Maze Using an Error-Prone Compass
Imagine you are trapped in a maze of caves. All you have is an old rusty compass and barely enough light to read it. How much inaccuracy can you allow to ensure that you can leave...
Tom Kamphans, Elmar Langetepe