Sciweavers

127 search results - page 22 / 26
» Conjunctive Query Containment under Access Limitations
Sort
View
PC
1998
153views Management» more  PC 1998»
14 years 9 months ago
Compilation Techniques for Out-of-Core Parallel Computations
The difficulty of handling out-of-core data limits the performance of supercomputers as well as the potential of the parallel machines. Since writing an efficient out-of-core ve...
Mahmut T. Kandemir, Alok N. Choudhary, J. Ramanuja...
CSB
2004
IEEE
152views Bioinformatics» more  CSB 2004»
15 years 1 months ago
EcMLST: An Online Database for Multi Locus Sequence Typing of Pathogenic Escherichia coli
In order to provide a portable and accurate typing system for the unambiguous characterization of pathogenic Escherichia coli isolates to the scientific community, we have constru...
Weihong Qi, David W. Lacher, Alyssa C. Bumbaugh, K...
EDBT
2009
ACM
184views Database» more  EDBT 2009»
15 years 4 months ago
Distributed similarity search in high dimensions using locality sensitive hashing
In this paper we consider distributed K-Nearest Neighbor (KNN) search and range query processing in high dimensional data. Our approach is based on Locality Sensitive Hashing (LSH...
Parisa Haghani, Sebastian Michel, Karl Aberer
VLDB
1997
ACM
104views Database» more  VLDB 1997»
15 years 1 months ago
Multiple-View Self-Maintenance in Data Warehousing Environments
A data warehouse materializes views derived from data that may not reside at the warehouse. Maintaining these views e ciently in response to base updates is di cult, since it may ...
Nam Huyn
CRYPTO
2007
Springer
134views Cryptology» more  CRYPTO 2007»
15 years 3 months ago
Domain Extension of Public Random Functions: Beyond the Birthday Barrier
A public random function is a random function that is accessible by all parties, including the adversary. For example, a (public) random oracle is a public random function {0, 1}...
Ueli M. Maurer, Stefano Tessaro