Sciweavers

2485 search results - page 360 / 497
» Time Bounded Frequency Computations
Sort
View
JSC
2006
95views more  JSC 2006»
13 years 8 months ago
Polyhedral conditions for the nonexistence of the MLE for hierarchical log-linear models
We provide a polyhedral description of the conditions for the existence of the maximum likelihood estimate (MLE) for a hierarchical log-linear model. The MLE exists if and only if...
Nicholas Eriksson, Stephen E. Fienberg, Alessandro...
ECCC
2000
93views more  ECCC 2000»
13 years 7 months ago
Security of the Most Significant Bits of the Shamir Message Passing Scheme
Boneh and Venkatesan have recently proposed a polynomial time algorithm for recovering a "hidden" element of a finite field Fp of p elements from rather short strings of...
Maria Isabel Gonzalez Vasco, Igor Shparlinski
TVCG
1998
102views more  TVCG 1998»
13 years 7 months ago
Ray-Tracing Triangular Trimmed Free-Form Surfaces
This paper presents a new approach to rendering triangular algebraic free form surfaces. A hierarchical subdivision of the surface with associated tight bounding volumes provides ...
Wolfgang Stürzlinger
ICCAD
2010
IEEE
124views Hardware» more  ICCAD 2010»
13 years 6 months ago
Symbolic performance analysis of elastic systems
Elastic systems, either synchronous or asynchronous, can be optimized for the average-case performance when they have units with early evaluation or variable latency. The performan...
Marc Galceran Oms, Jordi Cortadella, Michael Kishi...
ICDE
2011
IEEE
271views Database» more  ICDE 2011»
12 years 11 months ago
Authentication of moving kNN queries
— A moving kNN query continuously reports the k nearest neighbors of a moving query point. In addition to the query result, a service provider that evaluates moving queries often...
Man Lung Yiu, Eric Lo, Duncan Yung