Sciweavers

3006 search results - page 139 / 602
» Overview
Sort
View
AC
1998
Springer
15 years 3 months ago
The State of Cryptographic Hash Functions
This paper describes the state of the art for cryptographic hash functions. Different definitions are compared, and the few theoretical results on hash functions are discussed. A...
Bart Preneel
TCS
1998
15 years 3 months ago
A Partial k-Arboretum of Graphs with Bounded Treewidth
The notion of treewidth has seen to be a powerful vehicle for many graph algorithmic studies. This survey paper wants to give an overview of many classes of graphs that can be see...
Hans L. Bodlaender
PVLDB
2008
106views more  PVLDB 2008»
15 years 1 months ago
A revival of integrity constraints for data cleaning
Integrity constraints, a.k.a. data dependencies, are being widely used for improving the quality of schema. Recently constraints have enjoyed a revival for improving the quality o...
Wenfei Fan, Floris Geerts, Xibei Jia
JELIA
2010
Springer
15 years 1 months ago
Coala: A Compiler from Action Languages to ASP
Action languages allow for compactly describing dynamic domains. They are usually implemented by compilation, e.g., to Answer Set Programming. To this end, we developed a tool, cal...
Martin Gebser, Torsten Grote, Torsten Schaub
SPIRE
2010
Springer
15 years 1 months ago
Querying the Web Graph - (Invited Talk)
This paper focuses on using hyperlinks in the ranking of web search results. We give a brief overview of the vast body of work in the area; we provide a quantitative comparison of ...
Marc Najork