Sciweavers

2631 search results - page 129 / 527
» Less is More
Sort
View
AINA
2009
IEEE
13 years 8 months ago
Document-Oriented Pruning of the Inverted Index in Information Retrieval Systems
Searching very large collections can be costly in both computation and storage. To reduce this cost, recent research has focused on reducing the size (pruning) of the inverted ind...
Lei Zheng, Ingemar J. Cox
IACR
2011
89views more  IACR 2011»
12 years 10 months ago
Identity-Based Decryption
Identity-based decryption is an alternative to identity-based encryption, in which Alice encrypts a symmetric key for Bob under a trusted authority’s public key. Alice sends Bob...
Daniel R. L. Brown
VMCAI
2009
Springer
14 years 5 months ago
A Scalable Memory Model for Low-Level Code
Abstract. Because of its critical importance underlying all other software, lowlevel system software is among the most important targets for formal verification. Low-level systems...
Zvonimir Rakamaric, Alan J. Hu
ICC
2008
IEEE
167views Communications» more  ICC 2008»
14 years 4 months ago
Traceroute-Based Topology Inference without Network Coordinate Estimation
Abstract— Underlay topology information is important to construct efficient overlay networks. To achieve end-to-end network topology inference among a group of hosts, traceroute...
Xing Jin, Wanqing Tu, S.-H. Gary Chan
CVPR
2003
IEEE
15 years 11 days ago
Constraint on Five Points in Two Images
It is well-known that epipolar geometry relating two uncalibrated images is determined by at least seven correspondences. If there are more than seven of them, their positions can...
Tomás Werner