Sciweavers

1272 search results - page 250 / 255
» Implementation of Bitmap Based Incognito and Performance Eva...
Sort
View
SSDBM
2010
IEEE
220views Database» more  SSDBM 2010»
14 years 15 hour ago
Prefix Tree Indexing for Similarity Search and Similarity Joins on Genomic Data
Similarity search and similarity join on strings are important for applications such as duplicate detection, error detection, data cleansing, or comparison of biological sequences....
Astrid Rheinländer, Martin Knobloch, Nicky Ho...
INFOCOM
1997
IEEE
13 years 12 months ago
Analysis of Queueing Displacement Using Switch Port Speedup
Current high-speed packet switching systems, ATM in particular, have large port bu ering requirements. The use of highly integrated ASIC technology for implementing high-degree an...
Israel Cidon, Asad Khamisy, Moshe Sidi
IPPS
1997
IEEE
13 years 12 months ago
Control Schemes in a Generalized Utility for Parallel Branch-and-Bound Algorithms
Branch-and-bound algorithms are general methods applicable to various combinatorial optimization problems and parallelization is one of the most hopeful methods to improve these a...
Yuji Shinano, Kenichi Harada, Ryuichi Hirabayashi
FP
1992
135views Formal Methods» more  FP 1992»
13 years 11 months ago
High Level Specification of I/O in Functional Languages
The interface with the outside world has always been one of the weakest points of functional languages. It is not easy to incorporate I/O without being allowed to do side-effects....
Peter Achten, John H. G. van Groningen, Marinus J....
SOUPS
2010
ACM
13 years 11 months ago
Do windows users follow the principle of least privilege?: investigating user account control practices
The principle of least privilege requires that users and their programs be granted the most restrictive set of privileges possible to perform required tasks in order to limit the ...
Sara Motiee, Kirstie Hawkey, Konstantin Beznosov