Sciweavers

5344 search results - page 43 / 1069
» Privacy-Preserving Set Operations
Sort
View
TCS
2008
13 years 9 months ago
Reconstruction of convex lattice sets from tomographic projections in quartic time
Filling operations are procedures which are used in Discrete Tomography for the reconstruction of lattice sets having some convexity constraints. Many algorithms have been publish...
Sara Brunetti, Alain Daurat
AINA
2007
IEEE
14 years 1 months ago
Improving distributed join efficiency with extended bloom filter operations
Bloom filter based algorithms have proven successful as very efficient technique to reduce communication costs of database joins in a distributed setting. However, the full potent...
Loizos Michael, Wolfgang Nejdl, Odysseas Papapetro...
EMNLP
2006
13 years 11 months ago
Entity Annotation based on Inverse Index Operations
Entity annotation involves attaching a label such as `name' or `organization' to a sequence of tokens in a document. All the current rule-based and machine learningbased...
Ganesh Ramakrishnan, Sreeram Balakrishnan, Sachind...
CLEIEJ
2010
13 years 7 months ago
Evaluation of a Fault-tolerant Model for Tactic Operations of Mobile Robotic Groups Using Genetic Algorithms
This paper addresses the evaluation of a fault-tolerant model for tactic operations of mobile robotic groups. The coordinated action of the group is planned with Genetic Algorithm...
Gustavo Pessin, Fernando Santos Osório
PODC
2010
ACM
14 years 1 months ago
Transactional predication: high-performance concurrent sets and maps for STM
Concurrent collection classes are widely used in multi-threaded programming, but they provide atomicity only for a fixed set of operations. Software transactional memory (STM) pr...
Nathan Grasso Bronson, Jared Casper, Hassan Chafi,...