Sciweavers

8294 search results - page 1458 / 1659
» Presenting Data from Experiments in Algorithmics
Sort
View
145
Voted
ERSHOV
2003
Springer
15 years 9 months ago
On the Possibility of Provably Secure Obfuscating Programs
By obfuscation we mean any efficient semantic-preserving transformation of computer programs aimed at bringing a program into such a form, which impedes the understanding of its al...
Nikolay P. Varnovsky, Vladimir A. Zakharov
INTERACTION
2009
ACM
15 years 8 months ago
RoboEarth: connecting robots worldwide
In this paper, we present the core concept and the benefits of an approach called RoboEarth which will be highly beneficial for future robotic applications in science and industry...
Oliver Zweigle, René van de Molengraft, Raf...
162
Voted
SIGMOD
2000
ACM
161views Database» more  SIGMOD 2000»
15 years 8 months ago
Answering Complex SQL Queries Using Automatic Summary Tables
We investigate the problem of using materialized views to answer SQL queries. We focus on modern decision-support queries, which involve joins, arithmetic operations and other (po...
Markos Zaharioudakis, Roberta Cochrane, George Lap...
158
Voted
SIGGRAPH
1993
ACM
15 years 7 months ago
Frequency domain volume rendering
The Fourier projection-slice theorem allows projections of volume data to be generated in O(n2 log n) time for a volume of size n3 . The method operates by extracting and inverse ...
Takashi Totsuka, Marc Levoy
154
Voted
CIKM
2006
Springer
15 years 7 months ago
Privacy preserving sequential pattern mining in distributed databases
Research in the areas of privacy preserving techniques in databases and subsequently in privacy enhancement technologies have witnessed an explosive growth-spurt in recent years. ...
Vishal Kapoor, Pascal Poncelet, François Tr...
« Prev « First page 1458 / 1659 Last » Next »