Sciweavers

26354 search results - page 149 / 5271
» How we refactor, and how we know it
Sort
View
VLDB
1990
ACM
86views Database» more  VLDB 1990»
14 years 2 months ago
How to Forget the Past Without Repeating It
Bottom-up evaluation of deductive database programs has the advantage that it avoids repeated computation by storing all intermediate results and replacing recomputation by table ...
Jeffrey F. Naughton, Raghu Ramakrishnan
CRYPTO
2007
Springer
93views Cryptology» more  CRYPTO 2007»
14 years 2 months ago
How Many Oblivious Transfers Are Needed for Secure Multiparty Computation?
Oblivious transfer (OT) is an essential building block for secure multiparty computation when there is no honest majority. In this setting, current protocols for n 3 parties requ...
Danny Harnik, Yuval Ishai, Eyal Kushilevitz
FQAS
2006
Springer
100views Database» more  FQAS 2006»
14 years 2 months ago
Highly Heterogeneous XML Collections: How to Retrieve Precise Results?
Abstract. Highly heterogeneous XML collections are thematic collections exploiting different structures: the parent-child or ancestor-descendant relationships are not preserved and...
Ismael Sanz, Marco Mesiti, Giovanna Guerrini, Rafa...
DAGSTUHL
2003
13 years 11 months ago
How Should Control and Body Systems Be Coupled? A Robotic Case Study
Abstract. This study is intended to deal with the interdependency between control and body systems, and to discuss the “relationship as it should be” between these two systems....
Akio Ishiguro, Toshihiro Kawakatsu
IJCAI
2003
13 years 11 months ago
Propagate the Right Thing: How Preferences Can Speed-Up Constraint Solving
We present an algorithm Pref-AC that limits arc consistency (AC) to the preferred choices of a tree search procedure and that makes constraint solving more efficient without chan...
Christian Bessière, Anaïs Fabre, Ulric...