Sciweavers

5344 search results - page 126 / 1069
» Privacy-Preserving Set Operations
Sort
View
97
Voted
ETS
2002
IEEE
99views Hardware» more  ETS 2002»
15 years 2 months ago
Online Learning Technology in an SME Work-Based Setting
Over the last 20 years there has been increasing interest in work-based learning in the UK business sector as a means to improve and increase the skills of the UK workforce. The m...
Bernd Brink, John Munro, Mike Osborne
113
Voted
WDAG
2010
Springer
168views Algorithms» more  WDAG 2010»
15 years 28 days ago
Fast Randomized Test-and-Set and Renaming
Most people believe that renaming is easy: simply choose a name at random; if more than one process selects the same name, then try again. We highlight the issues that occur when t...
Dan Alistarh, Hagit Attiya, Seth Gilbert, Andrei G...
100
Voted
CAGD
2008
124views more  CAGD 2008»
15 years 2 months ago
All triangulations are reachable via sequences of edge-flips: an elementary proof
A simple proof is provided for the fact that the set of all possible triangulations of a planar point set in a polygonal domain is closed under the basic diagonal flip operation.
Eliyahu Osherovich, Alfred M. Bruckstein
117
Voted
PODC
2009
ACM
16 years 3 months ago
Partial synchrony based on set timeliness
d Abstract] Marcos K. Aguilera Microsoft Research Silicon Valley Mountain View, CA, USA Carole Delporte-Gallet Universit? Paris 7 Paris, France Hugues Fauconnier Universit? Paris ...
Marcos Kawazoe Aguilera, Carole Delporte-Gallet, H...
150
Voted
MICRO
2003
IEEE
258views Hardware» more  MICRO 2003»
15 years 7 months ago
LLVA: A Low-level Virtual Instruction Set Architecture
A virtual instruction set architecture (V-ISA) implemented via a processor-specific software translation layer can provide great flexibility to processor designers. Recent examp...
Vikram S. Adve, Chris Lattner, Michael Brukman, An...