Sciweavers

5344 search results - page 91 / 1069
» Privacy-Preserving Set Operations
Sort
View
DATE
2008
IEEE
107views Hardware» more  DATE 2008»
14 years 4 months ago
Instruction Set Extension Exploration in Multiple-Issue Architecture
To satisfy high-performance computing demand in modern embedded devices, current embedded processor architectures provide designer with possibility either to define customized ins...
I-Wei Wu, Zhi-Yuan Chen, Jean Jyh-Jiun Shann, Chun...
ISDA
2008
IEEE
14 years 4 months ago
Rough Set Granularity in Mobile Web Pre-caching
Mobile Web pre-caching (Web prefetching and caching) is an explication of performance enhancement and storage limitation of mobile devices. In this paper, we present the granulari...
Sarina Sulaiman, Siti Mariyam Hj. Shamsuddin, Ajit...
CPAIOR
2010
Springer
13 years 8 months ago
Boosting Set Constraint Propagation for Network Design
Abstract. This paper reconsiders the deployment of synchronous optical networks (SONET), an optimization problem naturally expressed in terms of set variables. Earlier approaches, ...
Justin Yip, Pascal Van Hentenryck, Carmen Gervet
ICRA
2010
IEEE
134views Robotics» more  ICRA 2010»
13 years 8 months ago
Design of guaranteed safe maneuvers using reachable sets: Autonomous quadrotor aerobatics in theory and practice
— For many applications, the control of a complex nonlinear system can be made easier by modeling the system as a collection of simplified hybrid modes, each representing a part...
Jeremy H. Gillula, Haomiao Huang, Michael P. Vitus...
TC
2010
13 years 8 months ago
TSS: Efficient Term Set Search in Large Peer-to-Peer Textual Collections
—Previous multikeyword search in DHT-based P2P systems often relies on multiple single keyword search operations, suffering from unacceptable traffic cost and poor accuracy. Prec...
Hanhua Chen, Jun Yan, Hai Jin, Yunhao Liu, Lionel ...