Sciweavers

1656 search results - page 277 / 332
» Labeling Schemes with Queries
Sort
View
ICDE
2006
IEEE
144views Database» more  ICDE 2006»
14 years 9 months ago
Super-Scalar RAM-CPU Cache Compression
High-performance data-intensive query processing tasks like OLAP, data mining or scientific data analysis can be severely I/O bound, even when high-end RAID storage systems are us...
Marcin Zukowski, Niels Nes, Peter A. Boncz, S&aacu...
CCS
2009
ACM
14 years 8 months ago
An ID-based authenticated key exchange protocol based on bilinear Diffie-Hellman problem
In this paper, we present a new ID-based two-party authenticated key exchange (AKE) protocol, which makes use of a new technique called twin Diffie-Hellman problem proposed by Cas...
Hai Huang, Zhenfu Cao
STOC
2001
ACM
151views Algorithms» more  STOC 2001»
14 years 8 months ago
On the cell probe complexity of membership and perfect hashing
We study two fundamental static data structure problems, membership and perfect hashing, in Yao's cell probe model. The first space and bit probe optimal worst case upper bou...
Rasmus Pagh
NOSSDAV
2009
Springer
14 years 2 months ago
A delaunay triangulation architecture supporting churn and user mobility in MMVEs
This article proposes a new distributed architecture for update message exchange in massively multi-user virtual environments (MMVE). MMVE applications require delivery of updates...
Mohsen Ghaffari, Behnoosh Hariri, Shervin Shirmoha...
ICPR
2008
IEEE
14 years 2 months ago
Biomapping: Privacy trustworthy biometrics using noninvertible and discriminable constructions
Biometric authentication and privacy protection are conflicting issues in a practical system. Since biometrics cannot be revoked or canceled if compromised duo to the permanent as...
Jinyang Shi, Zhiyang You, Ming Gu, Kwok-Yan Lam