Sciweavers

17288 search results - page 3351 / 3458
» Hybrid Optimizations: Which Optimization Algorithm to Use
Sort
View
114
Voted
CRYPTO
2004
Springer
111views Cryptology» more  CRYPTO 2004»
15 years 9 months ago
Signed Binary Representations Revisited
The most common method for computing exponentiation of random elements in Abelian groups are sliding window schemes, which enhance the efficiency of the binary method at the expens...
Katsuyuki Okeya, Katja Schmidt-Samoa, Christian Sp...
LCPC
2000
Springer
15 years 7 months ago
Efficient Dynamic Local Enumeration for HPF
In translating HPF programs, a compiler has to generate local iteration and communication sets. Apart from local enumeration, local storage compression is an issue, because in HPF ...
Will Denissen, Henk J. Sips
140
Voted
ECCV
2006
Springer
16 years 5 months ago
Self-calibration of a General Radially Symmetric Distortion Model
Abstract. We present a new approach for self-calibrating the distortion function and the distortion center of cameras with general radially symmetric distortion. In contrast to mos...
Jean-Philippe Tardif, Peter F. Sturm, Sébas...
148
Voted
WWW
2008
ACM
16 years 4 months ago
Efficiently querying rdf data in triple stores
Efficiently querying RDF [1] data is being an important factor in applying Semantic Web technologies to real-world applications. In this context, many efforts have been made to st...
Ying Yan, Chen Wang, Aoying Zhou, Weining Qian, Li...
148
Voted
WWW
2002
ACM
16 years 4 months ago
Learning to map between ontologies on the semantic web
Ontologies play a prominent role on the Semantic Web. They make possible the widespread publication of machine understandable data, opening myriad opportunities for automated info...
AnHai Doan, Jayant Madhavan, Pedro Domingos, Alon ...
« Prev « First page 3351 / 3458 Last » Next »