Sciweavers

7623 search results - page 1371 / 1525
» Constructive Volume Modeling
Sort
View
125
Voted
NA
2010
82views more  NA 2010»
15 years 2 months ago
Semi-definite programming techniques for structured quadratic inverse eigenvalue problems
In the past decade or so, semi-definite programming (SDP) has emerged as a powerful tool capable of handling a remarkably wide range of problems. This article describes an innovat...
Matthew M. Lin, Bo Dong, Moody T. Chu
113
Voted
PVLDB
2010
122views more  PVLDB 2010»
15 years 2 months ago
Avalanche-Safe LINQ Compilation
We report on a query compilation technique that enables the construction of alternative efficient query providers for Microsoft’s Language Integrated Query (LINQ) framework. LIN...
Torsten Grust, Jan Rittinger, Tom Schreiber
153
Voted
SEKE
2010
Springer
15 years 1 months ago
A String Constraint Solver for Detecting Web Application Vulnerability
Given the bytecode of a software system, is it possible to automatically generate attack signatures that reveal its vulnerabilities? A natural solution would be symbolically execu...
Xiang Fu, Chung-Chih Li
162
Voted
SPIRE
2010
Springer
15 years 1 months ago
Succinct Representations of Dynamic Strings
The rank and select operations over a string of length n from an alphabet of size σ have been used widely in the design of succinct data structures. In many applications, the stri...
Meng He, J. Ian Munro
102
Voted
TMI
2010
94views more  TMI 2010»
15 years 1 months ago
Theoretical Bounds and System Design for Multipinhole SPECT
Abstract—The pinhole camera in single photon emission computed tomography (SPECT) has an inherent trade-off between resolution and sensitivity. Recent systems overcome this to so...
Peter Nillius, Mats Danielsson
« Prev « First page 1371 / 1525 Last » Next »