Sciweavers

17288 search results - page 3180 / 3458
» Hybrid Optimizations: Which Optimization Algorithm to Use
Sort
View
125
Voted
CTRSA
2001
Springer
108views Cryptology» more  CTRSA 2001»
15 years 9 months ago
Improving SSL Handshake Performance via Batching
We present an algorithmic approach for speeding up SSL’s performance on a web server. Our approach improves the performance of SSL’s handshake protocol by up to a factor of 2....
Hovav Shacham, Dan Boneh
SIGGRAPH
2010
ACM
15 years 9 months ago
Design and fabrication of materials with desired deformation behavior
This paper introduces a data-driven process for designing and fabricating materials with desired deformation behavior. Our process starts with measuring deformation properties of ...
Bernd Bickel, Moritz Bächer, Miguel A. Otaduy, Hy...
IH
2001
Springer
15 years 9 months ago
Computational Forensic Techniques for Intellectual Property Protection
Computational forensic engineering (CFE) aims to identify the entity that created a particular intellectual property (IP). Rather than relying on watermarking content or designs, t...
Jennifer L. Wong, Darko Kirovski, Miodrag Potkonja...
172
Voted
GMP
2010
IEEE
214views Solid Modeling» more  GMP 2010»
15 years 9 months ago
Efficient Computation of 3D Clipped Voronoi Diagram
The Voronoi diagram is a fundamental geometry structure widely used in various fields, especially in computer graphics and geometry computing. For a set of points in a compact 3D d...
Dong-Ming Yan, Wenping Wang, Bruno Lévy, Ya...
SIGMOD
1999
ACM
101views Database» more  SIGMOD 1999»
15 years 9 months ago
Join Synopses for Approximate Query Answering
In large data warehousing environments, it is often advantageous to provide fast, approximate answers to complex aggregate queries based on statistical summaries of the full data....
Swarup Acharya, Phillip B. Gibbons, Viswanath Poos...
« Prev « First page 3180 / 3458 Last » Next »