Sciweavers

22193 search results - page 36 / 4439
» Multiple Restricted Multiplication
Sort
View
IH
1999
Springer
14 years 23 days ago
The Cocaine Auction Protocol: On the Power of Anonymous Broadcast
Abstract. Traditionally, cryptographic protocols are described as a sequence of steps, in each of which one principal sends a message to another. It is assumed that the fundamental...
Frank Stajano, Ross J. Anderson
RT
2000
Springer
14 years 1 days ago
Metropolis Light Transport for Participating Media
Abstract. In this paper we show how Metropolis Light Transport can be extended both in the underlying theoretical framework and the algorithmic implementation to incorporate volume...
Mark Pauly, Thomas Kollig, Alexander Keller
USENIX
2008
13 years 10 months ago
Striping without Sacrifices: Maintaining POSIX Semantics in a Parallel File System
Striping is a technique that distributes file content over multiple storage servers and thereby enables parallel access. In order to be able to provide a consistent view across fi...
Jan Stender, Björn Kolbeck, Felix Hupfeld, Eu...
DBSEC
2010
128views Database» more  DBSEC 2010»
13 years 8 months ago
On the Identification of Property Based Generalizations in Microdata Anonymization
Abstract. Majority of the search algorithms in microdata anonymization restrict themselves to a single privacy property and a single criteria to optimize. The solutions obtained ar...
Rinku Dewri, Indrajit Ray, Indrakshi Ray, Darrell ...
ACL
2010
13 years 6 months ago
Learning Arguments and Supertypes of Semantic Relations Using Recursive Patterns
A challenging problem in open information extraction and text mining is the learning of the selectional restrictions of semantic relations. We propose a minimally supervised boots...
Zornitsa Kozareva, Eduard H. Hovy