Sciweavers

4155 search results - page 100 / 831
» External Memory Algorithms
Sort
View
101
Voted
ASIACRYPT
2004
Springer
15 years 6 months ago
Time-Memory Trade-Off Attacks on Multiplications and T-Functions
T
Joydip Mitra, Palash Sarkar
124
Voted
EVOW
2007
Springer
15 years 8 months ago
Triggered Memory-Based Swarm Optimization in Dynamic Environments
In recent years, there has been an increasing concern from the evolutionary computation community on dynamic optimization problems since many real-world optimization problems are t...
Hongfeng Wang, Dingwei Wang, Shengxiang Yang
CORR
2006
Springer
112views Education» more  CORR 2006»
15 years 2 months ago
High-level synthesis under I/O Timing and Memory constraints
The design of complex Systems-on-Chips implies to take into account communication and memory access constraints for the integration of dedicated hardware accelerator. In this paper...
Philippe Coussy, Gwenolé Corre, Pierre Bome...
139
Voted
ICDE
2010
IEEE
801views Database» more  ICDE 2010»
16 years 2 months ago
The Similarity Join Database Operator
Similarity joins have been studied as key operations in multiple application domains, e.g., record linkage, data cleaning, multimedia and video applications, and phenomena detectio...
Mohamed H. Ali, Walid G. Aref, Yasin N. Silva
109
Voted
CCS
2006
ACM
15 years 6 months ago
Safety and consistency in policy-based authorization systems
In trust negotiation and other distributed proving systems, networked entities cooperate to form proofs that are justified by collections of certified attributes. These attributes...
Adam J. Lee, Marianne Winslett