Sciweavers

2904 search results - page 173 / 581
» Valuing Design Repair
Sort
View
145
Voted
CISC
2007
Springer
108views Cryptology» more  CISC 2007»
15 years 6 months ago
Verifiable Multi-secret Sharing Schemes for Multiple Threshold Access Structures
A multi-secret sharing scheme allows several secrets to be shared amongst a group of participants. In 2005, Shao and Cao developed a verifiable multi-secret sharing scheme where e...
Christophe Tartary, Josef Pieprzyk, Huaxiong Wang
134
Voted
AVI
2008
15 years 4 months ago
An empirical evaluation of interactive visualizations for preferential choice
Many critical decisions for individuals and organizations are often framed as preferential choices: the process of selecting the best option out of a set of alternatives. This pap...
Jeanette Bautista, Giuseppe Carenini
APVIS
2010
15 years 3 months ago
Volume visualization based on statistical transfer-function spaces
It is a difficult task to design transfer functions for noisy data. In traditional transfer-function spaces, data values of different materials overlap. In this paper we introduce...
Martin Haidacher, Daniel Patel, Stefan Bruckner, A...
120
Voted
PODS
2010
ACM
197views Database» more  PODS 2010»
15 years 2 months ago
When data dependencies over SQL tables meet the logics of paradox and S-3
We study functional and multivalued dependencies over SQL tables with NOT NULL constraints. Under a no-information interpretation of null values we develop tools for reasoning. We...
Sven Hartmann, Sebastian Link
MAM
2008
114views more  MAM 2008»
15 years 2 months ago
Asymmetrically banked value-aware register files for low-energy and high-performance
Designing high-performance low-energy register files is of critical importance to the continuation of current performance advances in wide-issue and deeply pipelined superscalar m...
Shuai Wang, Hongyan Yang, Jie S. Hu, Sotirios G. Z...