Sciweavers

274 search results - page 7 / 55
» When Two Case Bases Are Better than One: Exploiting Multiple...
Sort
View
INDOCRYPT
2003
Springer
14 years 17 days ago
On Multiplicative Linear Secret Sharing Schemes
We consider both information-theoretic and cryptographic settings for Multi-Party Computation (MPC), based on the underlying linear secret sharing scheme. Our goal is to study the ...
Ventzislav Nikov, Svetla Nikova, Bart Preneel
ISCA
2006
IEEE
187views Hardware» more  ISCA 2006»
14 years 1 months ago
A Case for MLP-Aware Cache Replacement
Performance loss due to long-latency memory accesses can be reduced by servicing multiple memory accesses concurrently. The notion of generating and servicing long-latency cache m...
Moinuddin K. Qureshi, Daniel N. Lynch, Onur Mutlu,...
SIGMOD
2002
ACM
120views Database» more  SIGMOD 2002»
14 years 7 months ago
Exploiting statistics on query expressions for optimization
Statistics play an important role in influencing the plans produced by a query optimizer. Traditionally, optimizers use statistics built over base tables and assume independence b...
Nicolas Bruno, Surajit Chaudhuri
SIGMOD
2003
ACM
237views Database» more  SIGMOD 2003»
14 years 7 months ago
Qcluster: Relevance Feedback Using Adaptive Clustering for Content-Based Image Retrieval
The learning-enhanced relevance feedback has been one of the most active research areas in content-based image retrieval in recent years. However, few methods using the relevance ...
Deok-Hwan Kim, Chin-Wan Chung
SLIP
2009
ACM
14 years 1 months ago
On the bound of time-domain power supply noise based on frequency-domain target impedance
One of the popular design methodologies for power distribution networks (PDNs) is to identify a target impedance to be met across a broad frequency range. The methodology is based...
Xiang Hu, Wenbo Zhao, Peng Du, Yulei Zhang, Amiral...