Sciweavers

3303 search results - page 177 / 661
» Multidimensional Access Methods
Sort
View
118
Voted
IACR
2011
129views more  IACR 2011»
14 years 23 days ago
Bounded Vector Signatures and their Applications
Although malleability is undesirable in traditional digital signatures, schemes with limited malleability properties enable interesting functionalities that may be impossible to o...
Lei Wei, Scott E. Coull, Michael K. Reiter
106
Voted
IJCAI
2001
15 years 2 months ago
Keyword Spices: A New Method for Building Domain-Specific Web Search Engines
This paper presents a new method for building domain-specific web search engines. Previous methods eliminate irrelevant documents from the pages accessed using heuristics based on...
Satoshi Oyama, Takashi Kokubo, Toru Ishida, Teruhi...
115
Voted
GPC
2007
Springer
15 years 7 months ago
A Novel Data Grid Coherence Protocol Using Pipeline-Based Aggressive Copy Method
Grid systems are well-known for its high performance computing or large data storage with inexpensive devices. They can be categorized into two major types: computational grid and ...
Reen-Cheng Wang, Su-Ling Wu, Ruay-Shiung Chang
114
Voted
ICWE
2004
Springer
15 years 6 months ago
Getting Ready Web Engineering Methods for the Semantic Web
Current Web Engineering methods develop "closed" web applications from conceptual models. This fact makes difficult the integration and the interoperability of different ...
Victoria Torres, Joan Fons, Oscar Asensi, Vicente ...
126
Voted
MIPS
2004
Springer
108views Multimedia» more  MIPS 2004»
15 years 6 months ago
Residual Motion Coding Method for Error Resilient Transcoding System
Abstract. For video adaptation in universal multimedia access systems, video contents have to be transcoded according to the requirements of network bandwidth and the performance o...
June-Sok Lee, Goo-Rak Kwon, Jae-Won Kim, Kyung-Hoo...