Sciweavers

4908 search results - page 9 / 982
» On the Complexity of Optimal K-Anonymity
Sort
View
CORR
2011
Springer
183views Education» more  CORR 2011»
14 years 9 months ago
Pattern tree-based XOLAP rollup operator for XML complex hierarchies
—With the rise of XML as a standard for representing business data, XML data warehousing appears as a suitable solution for decision-support applications. In this context, it is ...
Marouane Hachicha, Jérôme Darmont
79
Voted
ICASSP
2011
IEEE
14 years 5 months ago
Efficient discrete fractional Hirschman optimal transform and its application
All of the existing N-point discrete fractional signal transforms require O(N2 ) computation complexity. In this paper, we propose a new discrete fractional signal transform whose...
Wen-Liang Hsue, Soo-Chang Pei, Jian-Jiun Ding
133
Voted
PPDP
2010
Springer
14 years 11 months ago
Precise complexity analysis for efficient datalog queries
Given a set of Datalog rules, facts, and a query, answers to the query can be inferred bottom-up starting with the facts or top-down starting with the query. For efficiently answe...
K. Tuncay Tekle, Yanhong A. Liu
ESA
2011
Springer
269views Algorithms» more  ESA 2011»
14 years 1 months ago
Alphabet-Independent Compressed Text Indexing
Self-indexes can represent a text in asymptotically optimal space under the k-th order entropy model, give access to text substrings, and support indexed pattern searches. Their ti...
Djamal Belazzougui, Gonzalo Navarro
124
Voted
ASIACRYPT
2010
Springer
14 years 11 months ago
The Round Complexity of Verifiable Secret Sharing: The Statistical Case
We consider the round complexity of a basic cryptographic task: verifiable secret sharing (VSS). This well-studied primitive provides a good "test case" for our understan...
Ranjit Kumaresan, Arpita Patra, C. Pandu Rangan