Sciweavers

5344 search results - page 175 / 1069
» Privacy-Preserving Set Operations
Sort
View
SOFSEM
2012
Springer
13 years 11 months ago
Iterated Hairpin Completions of Non-crossing Words
Abstract. Iterated hairpin completion is an operation on formal languages that is inspired by the hairpin formation in DNA biochemistry. Iterated hairpin completion of a word (or m...
Lila Kari, Steffen Kopecki, Shinnosuke Seki
174
Voted
SSDBM
1999
IEEE
140views Database» more  SSDBM 1999»
15 years 7 months ago
An Infrastructure for Scalable Parallel Multidimensional Analysis
Multidimensional Analysis in On-Line Analytical Processing (OLAP), and Scientific and statistical databases (SSDB) use operations requiring summary information on multi-dimensiona...
Sanjay Goil, Alok N. Choudhary
116
Voted
INFOCOM
2006
IEEE
15 years 9 months ago
Trade-Off Curves for QoS Routing
— Trade-off curves for the exact and the relaxed QoS routing problem are presented and discussed. In addition, an efficient parametric linear programming algorithm to compute th...
Piet Van Mieghem, Lieven Vandenberghe
134
Voted
ICCV
2005
IEEE
15 years 9 months ago
A Theory of Inverse Light Transport
In this paper we consider the problem of computing and removing interreflections in photographs of real scenes. Towards this end, we introduce the problem of inverse light transp...
Steven M. Seitz, Yasuyuki Matsushita, Kiriakos N. ...
ECAI
2004
Springer
15 years 8 months ago
A Syntactical Approach to Revision
The aim of this article is to revisit Dalal’s operator for belief revision. Dalal has proposed a technique for revising belief bases based on the minimization of a distance betw...
Guilherme Bittencourt, Laurent Perrussel, Jerusa M...