Sciweavers

2853 search results - page 156 / 571
» Finding related tables
Sort
View
FAST
2004
15 years 2 months ago
Atropos: A Disk Array Volume Manager for Orchestrated Use of Disks
The Atropos logical volume manager allows applications to exploit characteristics of its underlying collection of disks. It stripes data in track-sized units and explicitly expose...
Jiri Schindler, Steven W. Schlosser, Minglong Shao...
102
Voted
ICISC
2001
132views Cryptology» more  ICISC 2001»
15 years 2 months ago
Slide Attacks with a Known-Plaintext Cryptanalysis
Although many strong cryptanalytic tools exploit weaknesses in the data-randomizinig part of a block cipher, relatively few general tools for cryptanalyzing on the other part, the ...
Soichi Furuya
79
Voted
IJCAI
2001
15 years 2 months ago
From Images to Bodies: Modelling and Exploiting Spatial Occlusion and Motion Parallax
This paper describes the Region Occlusion Calculus (ROC-20), that can be used to model spatial occlusion and the effects of motion parallax of arbitrary shaped objects. ROC-20 ass...
David A. Randell, Mark Witkowski, Murray Shanahan
IPM
2006
167views more  IPM 2006»
15 years 22 days ago
Browsing mixed structured and unstructured data
Both structured and unstructured data, as well as structured data representing several different types of tuples, may be integrated into a single list for browsing or retrieval. D...
Robert M. Losee
AC
2002
Springer
15 years 19 days ago
Empirical Studies of Quality Models in Object-Oriented Systems
Measuring structural design properties of a software system, such as coupling, cohesion, or complexity, is a promising approach towards early quality assessments. To use such meas...
Lionel C. Briand, Jürgen Wüst