Sciweavers

443 search results - page 19 / 89
» More on the Size of Higman-Haines Sets: Effective Constructi...
Sort
View
VC
2008
126views more  VC 2008»
13 years 7 months ago
Efficient reconstruction from non-uniform point sets
Abstract We propose a method for non-uniform reconstruction of 3D scalar data. Typically, radial basis functions, trigonometric polynomials or shift-invariant functions are used in...
Erald Vuçini, Torsten Möller, M. Eduar...
MICRO
1997
IEEE
141views Hardware» more  MICRO 1997»
13 years 11 months ago
Unroll-and-Jam Using Uniformly Generated Sets
Modern architectural trends in instruction-level parallelism (ILP) are to increase the computational power of microprocessors significantly. As a result, the demands on memory ha...
Steve Carr, Yiping Guan
TCC
2007
Springer
86views Cryptology» more  TCC 2007»
14 years 1 months ago
Weakly-Private Secret Sharing Schemes
Abstract. Secret-sharing schemes are an important tool in cryptography that is used in the construction of many secure protocols. However, the shares’ size in the best known secr...
Amos Beimel, Matthew K. Franklin
ICDE
2008
IEEE
118views Database» more  ICDE 2008»
14 years 9 months ago
Robust Runtime Optimization of Data Transfer in Queries over Web Services
Self-managing solutions have recently attracted a lot of interest from the database community. The need for self-* properties is more evident in distributed applications comprising...
Anastasios Gounaris, Christos Yfoulis, Rizos Sakel...
CIKM
2008
Springer
13 years 9 months ago
Creating tag hierarchies for effective navigation in social media
In social media, such as blogs, since the content naturally evolves over time, it is hard or in many cases impossible to organize the content for effective navigation. Thus, one c...
K. Selçuk Candan, Luigi Di Caro, Maria Luis...