Sciweavers

107 search results - page 18 / 22
» Further results on the Craig-Sakamoto Equation
Sort
View
PODS
2006
ACM
137views Database» more  PODS 2006»
15 years 11 months ago
Data exchange: computing cores in polynomial time
Data exchange deals with inserting data from one database into another database having a different schema. We study and solve a central computational problem of data exchange, nam...
Georg Gottlob, Alan Nash
ICDT
2010
ACM
161views Database» more  ICDT 2010»
15 years 8 months ago
Composition with Target Constraints
It is known that the composition of schema mappings, each specified by source-to-target tgds (st-tgds), can be specified by a secondorder tgd (SO tgd). We consider the question of...
Marcelo Arenas, Ronald Fagin, Alan Nash
IWSEC
2009
Springer
15 years 5 months ago
Improved Distinguishing Attacks on HC-256
The software-efficient stream cipher HC-256 was proposed by Wu at FSE 2004. Due to its impressive performance, the cipher was also a well-received entrant to the ECRYPT eSTREAM com...
Gautham Sekar, Bart Preneel
HICSS
2007
IEEE
125views Biometrics» more  HICSS 2007»
15 years 5 months ago
Stochastic Model for Power Grid Dynamics
We introduce a stochastic model that describes the quasistatic dynamics of an electric transmission network under perturbations introduced by random load fluctuations, random rem...
Marian Anghel, Kenneth A. Werley, Adilson E. Motte...
IPMI
2005
Springer
15 years 4 months ago
PET Image Reconstruction: A Robust State Space Approach
Statistical iterative reconstruction algorithms have shown improved image quality over conventional nonstatistical methods in PET by using accurate system response models and measu...
Huafeng Liu, Yi Tian, Pengcheng Shi