Sciweavers

3305 search results - page 547 / 661
» Can we Rely on SQL
Sort
View
SIGCOMM
2005
ACM
15 years 10 months ago
Fast hash table lookup using extended bloom filter: an aid to network processing
Hash table is used as one of the fundamental modules in several network processing algorithms and applications such as route lookup, packet classification, per-flow state manage...
Haoyu Song, Sarang Dharmapurikar, Jonathan S. Turn...
EWCBR
2004
Springer
15 years 10 months ago
Software Design Retrieval Using Bayesian Networks and WordNet
The complexity of software systems makes design reuse a necessary task in the software development process. CASE tools can provide cognitive assistance in this task, helping the so...
Paulo Gomes
SAINT
2003
IEEE
15 years 9 months ago
Mobile Agent based realization of a distance evaluation system
The growth of the Internet has led to new avenues for distance education. A crucial factor for the success of distance education is effective mechanisms for distance evaluation. E...
Vikram Jamwal, Sridhar Iyer
ECCV
2006
Springer
15 years 8 months ago
Accurate Measurement of Cartilage Morphology Using a 3D Laser Scanner
We describe a method to accurately assess articular cartilage morphology using the three-dimensional laser scanning technology. Traditional methods to obtain ground truth for valid...
Nhon H. Trinh, Jonathan Lester, Braden C. Fleming,...
ASIACRYPT
2003
Springer
15 years 8 months ago
Certificateless Public Key Cryptography
This paper introduces the concept of certificateless public key cryptography (CL-PKC). In contrast to traditional public key cryptographic systems, CL-PKC does not require the use...
Sattam S. Al-Riyami, Kenneth G. Paterson