Sciweavers

3303 search results - page 632 / 661
» Multidimensional Access Methods
Sort
View
ELPUB
2007
ACM
15 years 6 months ago
Evaluating Digital Humanities Resources: The LAIRAH Project Checklist and the Internet Shakespeare Editions Project
The following paper presents a case study of the way that the research done by the LAIRAH project may be applied in the case of a real digital resource for humanities scholarship....
Claire Warwick, Melissa Terras, Isabel Galina, Pau...
SP
2010
IEEE
206views Security Privacy» more  SP 2010»
15 years 6 months ago
Revocation Systems with Very Small Private Keys
In this work, we design a method for creating public key broadcast encryption systems. Our main technical innovation is based on a new “two equation” technique for revoking us...
Allison B. Lewko, Amit Sahai, Brent Waters
137
Voted
WCNC
2010
IEEE
15 years 6 months ago
Frequency Reuse Techniques for Attaining Both Coverage and High Spectral Efficiency in OFDMA Cellular Systems
—Inter-cell interference (ICI) is always a big obstacle to attain wide area coverage and high spectral efficiency in cellular systems. In this work we make a study of two well-kn...
Zheng Xie, Bernhard Walke
CC
2006
Springer
124views System Software» more  CC 2006»
15 years 6 months ago
Polyhedral Code Generation in the Real World
The polyhedral model is known to be a powerful framework to reason about high level loop transformations. Recent developments in optimizing compilers broke some generally accepted ...
Nicolas Vasilache, Cédric Bastoul, Albert C...
128
Voted
ECCV
2004
Springer
15 years 6 months ago
Approximate Confidence Intervals for Estimation of Matching Error Rates of Biometric Identification Devices
Abstract. Assessing the matching error rates of a biometric identification devices is integral to understanding its performance. Here we propose and evaluate several methods for cr...
Travis J. Atkinson, Michael E. Schuckers