Sciweavers

5344 search results - page 144 / 1069
» Privacy-Preserving Set Operations
Sort
View
DASFAA
1999
IEEE
84views Database» more  DASFAA 1999»
15 years 7 months ago
P-Tree: A B-Tree Index for Lists
The high frequency of applications involving large, ordered, nested lists suggests that list is the "next most" natural data type after set. A list differs from a set th...
Ke Wang, Beng Chin Ooi, Sam Yuan Sung
SP
2008
IEEE
119views Security Privacy» more  SP 2008»
15 years 9 months ago
Verifying the Safety of User Pointer Dereferences
Operating systems divide virtual memory addresses into kernel space and user space. The interface of a modern operating system consists of a set of system call procedures that may...
Suhabe Bugrara, Alex Aiken
CVPR
2010
IEEE
2248views Computer Vision» more  CVPR 2010»
15 years 11 months ago
Morphological Snakes
We introduce a morphological approach to curve evolution. The differential operators used in the standard PDE snake models can be approached using morphological operations...
Luis Álvarez, Luis Baumela, Pedro Henríquez, Pab...
ECRTS
2005
IEEE
15 years 8 months ago
Speed Modulation in Energy-Aware Real-Time Systems
This paper presents a general framework for analyzing and designing embedded systems with energy and timing requirements. A set of realistic assumptions is considered in the model...
Enrico Bini, Giorgio C. Buttazzo, Giuseppe Lipari
CAISE
2004
Springer
15 years 8 months ago
Towards a Semi-Automated Approach to Intermodel Transformation
This paper introduces an extension to the hypergraph data model used in the AutoMed data intergration approach that allows constraints common in static data modelling languages to ...
Michael Boyd, Peter McBrien