Sciweavers

4103 search results - page 773 / 821
» Some results on the Collatz problem
Sort
View
CHI
2008
ACM
14 years 10 months ago
Readability of scanned books in digital libraries
Displaying scanned book pages in a web browser is difficult, due to an array of characteristics of the common user's configuration that compound to yield text that is degrade...
Alexander J. Quinn, Chang Hu, Takeshi Arisaka, Ann...
VLDB
2008
ACM
148views Database» more  VLDB 2008»
14 years 10 months ago
Purpose based access control for privacy protection in relational database systems
Abstract In this article, we present a comprehensive approach for privacy preserving access control based on the notion of purpose. In our model, purpose information associated wit...
Ji-Won Byun, Ninghui Li
SIGMOD
2007
ACM
186views Database» more  SIGMOD 2007»
14 years 10 months ago
Fg-index: towards verification-free query processing on graph databases
Graphs are prevalently used to model the relationships between objects in various domains. With the increasing usage of graph databases, it has become more and more demanding to e...
James Cheng, Yiping Ke, Wilfred Ng, An Lu
EDBT
2008
ACM
118views Database» more  EDBT 2008»
14 years 10 months ago
Robustness in automatic physical database design
Automatic physical database design tools rely on "what-if" interfaces to the query optimizer to estimate the execution time of the training query workload under differen...
Kareem El Gebaly, Ashraf Aboulnaga
FPGA
2010
ACM
209views FPGA» more  FPGA 2010»
14 years 6 months ago
FPGA power reduction by guarded evaluation
Guarded evaluation is a power reduction technique that involves identifying sub-circuits (within a larger circuit) whose inputs can be held constant (guarded) at specific times d...
Chirag Ravishankar, Jason Helge Anderson