Sciweavers

3206 search results - page 256 / 642
» Optimizing Graph Algorithms for Improved Cache Performance
Sort
View
117
Voted
SP
2005
IEEE
149views Security Privacy» more  SP 2005»
15 years 9 months ago
Distributed Proving in Access-Control Systems
We present a distributed algorithm for assembling a proof that a request satisfies an access-control policy expressed in a formal logic, in the tradition of Lampson et al. [16]. ...
Lujo Bauer, Scott Garriss, Michael K. Reiter
114
Voted
ICCAD
1997
IEEE
121views Hardware» more  ICCAD 1997»
15 years 8 months ago
Adaptive methods for netlist partitioning
An algorithm that remains in use at the core of many partitioning systems is the Kernighan-Lin algorithm and a variant the Fidducia-Matheysses (FM) algorithm. To understand the FM...
Wray L. Buntine, Lixin Su, A. Richard Newton, Andr...
131
Voted
EVOW
2006
Springer
15 years 7 months ago
Evolutionary Singularity Filter Bank Optimization for Fingerprint Image Enhancement
Singularity is the special feature of fingerprints for identification and classification. Since the performance of singularity extraction depends on the quality of fingerprint imag...
Ung-Keun Cho, Jin-Hyuk Hong, Sung-Bae Cho
127
Voted
IPPS
2005
IEEE
15 years 9 months ago
On the Optimal Placement of Secure Data Objects over Internet
Secret sharing algorithms have been used for intrusion tolerance, which ensure the confidentiality, integrity and availability of critical information. However, dynamically changi...
Manghui Tu, Peng Li, Qingkai Ma, I-Ling Yen, Farok...
139
Voted
ICML
2010
IEEE
15 years 1 months ago
Learning optimally diverse rankings over large document collections
Most learning to rank research has assumed that the utility of different documents is independent, which results in learned ranking functions that return redundant results. The fe...
Aleksandrs Slivkins, Filip Radlinski, Sreenivas Go...