Histogram techniques have been used in many commercial database management systems to estimate a query result size. Recently, it has been shown that they are very effective to su...
The challenge in shift scheduling lies in the construction of a set of work shifts, which are subject to specific regulations, in order to cover fluctuating staff demands. This pro...
Abstract. We study the natural problem of secure n-party computation (in the passive, computationally unbounded attack model) of the n-product function fG(x1, . . . , xn) = x1 · x...
Yvo Desmedt, Josef Pieprzyk, Ron Steinfeld, Huaxio...
We present a hierarchical feature fusion model for image classification that is constructed by an evolutionary learning algorithm. The model has the ability to combine local patch...
Fabien Scalzo, George Bebis, Mircea Nicolescu, Lea...
—This paper describes the design, construction, and testing of a biomimetic pectoral (side) fin with actively controlled curvature for UUV propulsion. First, a 3D unsteady comput...
John Palmisano, Ravi Ramamurti, Kerr-Jia Lu, Jonah...