Sciweavers

1005 search results - page 172 / 201
» Practical Secure Function Evaluation
Sort
View
113
Voted
EUROMICRO
2003
IEEE
15 years 5 months ago
Closing the Gap: From Nescience to Knowledge Management
Knowledge management (KM) systems aim at supporting knowledge workers in general and software engineers in particular. These tools help to elicit, structure, and retrieve knowledg...
Alexander Schatten, Stefan Biffl, A. Min Tjoa
83
Voted
ISQED
2003
IEEE
96views Hardware» more  ISQED 2003»
15 years 5 months ago
Impact of Interoperability on CAD-IP Reuse: An Academic Viewpoint
Mind-boggling complexity of EDA tools necessitates reuse of intellectual property in any large-scale commercial or academic operation. However, due to the nature of software, a to...
Andrew B. Kahng, Igor L. Markov
104
Voted
GECCO
2003
Springer
114views Optimization» more  GECCO 2003»
15 years 5 months ago
Genetic Algorithm for Supply Planning Optimization under Uncertain Demand
Supply planning optimization is one of the most important issues for manufacturers and distributors. Supply is planned to meet the future demand. Under the uncertainty involved in ...
Masaru Tezuka, Masahiro Hiji
100
Voted
MICCAI
1999
Springer
15 years 4 months ago
Quantitative Comparison of Sinc-Approximating Kernels for Medical Image Interpolation
Interpolation is required in many medical image processing operations. From sampling theory, it follows that the ideal interpolation kernel is the sinc function, which is of infin...
Erik H. W. Meijering, Wiro J. Niessen, Josien P. W...
89
Voted
CPM
1998
Springer
115views Combinatorics» more  CPM 1998»
15 years 4 months ago
Aligning Alignments
d abstract) John Kececioglu and Dean Starrett Department of Computer Science The University of Arizona Tucson AZ 85721, USA A basic computational problem that arises in both the...
John D. Kececioglu, Weiqing Zhang