Sciweavers

5344 search results - page 160 / 1069
» Privacy-Preserving Set Operations
Sort
View
ISCAS
2002
IEEE
103views Hardware» more  ISCAS 2002»
15 years 8 months ago
A SPICE model for single electronics
With single-electron tunneling (SET) technology it is possible to build electronic circuits with extreme low power properties. These SET circuits must therefore operate in the sin...
R. van de Haar, J. Hoekstra, R. H. Klunder
106
Voted
GRAPHICSINTERFACE
2007
15 years 4 months ago
Optimized tile-based texture synthesis
One significant problem in tile-based texture synthesis is the presence of conspicuous seams in the tiles. The reason is that the sample patches employed as primary patterns of t...
Weiming Dong, Ning Zhou, Jean-Claude Paul
SIGMOD
2003
ACM
112views Database» more  SIGMOD 2003»
16 years 3 months ago
A Theory of Redo Recovery
Our goal is to understand redo recovery. We define an installation graph of operations in an execution, an ordering significantly weaker than conflict ordering from concurrency co...
David B. Lomet, Mark R. Tuttle
ESOP
2009
Springer
15 years 10 months ago
Modular Monad Transformers
Abstract. During the last two decades, monads have become an indispensable tool for structuring functional programs with computational effects. In this setting, the mathematical n...
Mauro Jaskelioff
130
Voted
ARTS
1999
Springer
15 years 7 months ago
Process Algebra with Probabilistic Choice
Published results show that various models may be obtained by combining parallel composition with probability and with or without non-determinism. In this paper we treat this probl...
Suzana Andova