Sciweavers

204 search results - page 17 / 41
» Let's Evaluate Performance Algebraically
Sort
View
CORR
2011
Springer
158views Education» more  CORR 2011»
13 years 2 months ago
SqFreeEVAL: An (almost) optimal real-root isolation algorithm
Let f be a univariate polynomial with real coefficients, f ∈ R[X]. Subdivision algorithms based on algebraic techniques (e.g., Sturm or Descartes methods) are widely used for is...
Michael Burr, Felix Krahmer
CCS
2007
ACM
14 years 1 months ago
Direct static enforcement of high-level security policies
A high-level security policy states an overall safety requirement for a sensitive task. One example of a high-level security policy is a separation of duty policy, which requires ...
Qihua Wang, Ninghui Li
IJAHUC
2008
118views more  IJAHUC 2008»
13 years 7 months ago
Analysis models for unguided search in unstructured P2P networks
: Random walk and flooding are basic mechanisms for searching unstructured overlays. This paper shows that node coverage is an important metric for query performance in random grap...
Bin Wu, Ajay D. Kshemkalyani
SIGMOD
2006
ACM
159views Database» more  SIGMOD 2006»
14 years 7 months ago
Flexible and efficient XML search with complex full-text predicates
Recently, there has been extensive research that generated a wealth of new XML full-text query languages, ranging from simple Boolean search to combining sophisticated proximity a...
Sihem Amer-Yahia, Emiran Curtmola, Alin Deutsch
ICIP
2009
IEEE
13 years 5 months ago
Efficient reduction of support vectors in kernel-based methods
Kernel-based methods, e.g., support vector machine (SVM), produce high classification performances. However, the computation becomes time-consuming as the number of the vectors su...
Takumi Kobayashi, Nobuyuki Otsu