Sciweavers

5214 search results - page 934 / 1043
» The Online Specialization Problem
Sort
View
ICDT
2010
ACM
193views Database» more  ICDT 2010»
15 years 6 months ago
Data correspondence, exchange and repair
Checking the correspondence between two or more database instances and enforcing it is a procedure widely used in practice without however having been explored from a theoretical ...
Gösta Grahne, Adrian Onet
ESCIENCE
2006
IEEE
15 years 6 months ago
Domain Based Access Control Model for Distributed Collaborative Applications
This paper describes the design and development of a flexible domain-based access control infrastructure for distributed Collaborative Environments. The paper proposes extensions ...
Yuri Demchenko, Cees de Laat, Leon Gommans, Ren&ea...
141
Voted
PKC
2010
Springer
126views Cryptology» more  PKC 2010»
15 years 6 months ago
Implicit Factoring with Shared Most Significant and Middle Bits
We study the problem of integer factoring given implicit information of a special kind. The problem is as follows: let N1 = p1q1 and N2 = p2q2 be two RSA moduli of same bit-size, w...
Jean-Charles Faugère, Raphaël Marinier...
NIPS
2007
15 years 5 months ago
An Analysis of Convex Relaxations for MAP Estimation
The problem of obtaining the maximum a posteriori estimate of a general discrete random field (i.e. a random field defined using a finite and discrete set of labels) is known ...
Pawan Mudigonda, Vladimir Kolmogorov, Philip H. S....
130
Voted
SODA
2004
ACM
128views Algorithms» more  SODA 2004»
15 years 5 months ago
Equivalence of local treewidth and linear local treewidth and its algorithmic applications
We solve an open problem posed by Eppstein in 1995 [14, 15] and re-enforced by Grohe [16, 17] concerning locally bounded treewidth in minor-closed families of graphs. A graph has ...
Erik D. Demaine, Mohammad Taghi Hajiaghayi