Sciweavers

3872 search results - page 691 / 775
» The Java memory model
Sort
View
WDAG
2005
Springer
67views Algorithms» more  WDAG 2005»
14 years 3 months ago
What Can Be Implemented Anonymously?
Abstract. The vast majority of papers on distributed computing assume that processes are assigned unique identifiers before computation begins. But is this assumption necessary? W...
Rachid Guerraoui, Eric Ruppert
CDB
2004
Springer
143views Database» more  CDB 2004»
14 years 3 months ago
Constraint Processing Techniques for Improving Join Computation: A Proof of Concept
Constraint Processing and Database techniques overlap significantly. We discuss here the application of a constraint satisfaction technique, called dynamic bundling, to databases....
Anagh Lal, Berthe Y. Choueiry
CIKM
2004
Springer
14 years 3 months ago
Evaluating window joins over punctuated streams
We explore join optimizations in the presence of both timebased constraints (sliding windows) and value-based constraints (punctuations). We present the first join solution named...
Luping Ding, Elke A. Rundensteiner
EUROCRYPT
2004
Springer
14 years 3 months ago
Projective Coordinates Leak
Denoting by P = [k]G the elliptic-curve double-and-add multiplication of a public base point G by a secret k, we show that allowing an adversary access to the projective representa...
David Naccache, Nigel P. Smart, Jacques Stern
ISMIR
2004
Springer
159views Music» more  ISMIR 2004»
14 years 3 months ago
Towards an Efficient Algorithm for Automatic Score-to-Audio Synchronization
In the last few years, several algorithms for the automatic alignment of audio and score data corresponding to the same piece of music have been proposed. Among the major drawback...
Meinard Müller, Frank Kurth, Tido Röder