Sciweavers

5344 search results - page 120 / 1069
» Privacy-Preserving Set Operations
Sort
View
IKE
2007
15 years 4 months ago
A Set-Theoretic Data Model For Evolving Database Environments
The paper presents an integrated set-theoretic data model that offers a framework for defining a unified schema for any database environment. We utilise the concepts ”entity...
Emmanuel J. Yannakoudakis, Panagiotis Andrikopoulo...
111
Voted
HEURISTICS
1998
252views more  HEURISTICS 1998»
15 years 2 months ago
Constraint Handling in Genetic Algorithms: The Set Partitioning Problem
In this paper we present a genetic algorithm-based heuristic for solving the set partitioning problem (SPP). The SPP is an important combinatorial optimisation problem used by man...
P. C. Chu, J. E. Beasley
229
Voted
ICDE
2009
IEEE
194views Database» more  ICDE 2009»
16 years 4 months ago
Top-k Set Similarity Joins
Abstract-- Similarity join is a useful primitive operation underlying many applications, such as near duplicate Web page detection, data integration, and pattern recognition. Tradi...
Chuan Xiao, Wei Wang 0011, Xuemin Lin, Haichuan Sh...
WEA
2010
Springer
545views Algorithms» more  WEA 2010»
15 years 9 months ago
Experiments on Union-Find Algorithms for the Disjoint-Set Data Structure
Abstract. The disjoint-set data structure is used to maintain a collection of non-overlapping sets of elements from a finite universe. Algorithms that operate on this data structu...
Md. Mostofa Ali Patwary, Jean R. S. Blair, Fredrik...
119
Voted
ASAP
2003
IEEE
141views Hardware» more  ASAP 2003»
15 years 7 months ago
Automatic Instruction Set Extension and Utilization for Embedded Processors
There is a growing demand for application-specific embedded processors in system-on-a-chip designs. Current tools and design methodologies often require designers to manually spec...
Armita Peymandoust, Laura Pozzi, Paolo Ienne, Giov...