Sciweavers

5344 search results - page 176 / 1069
» Privacy-Preserving Set Operations
Sort
View
VLDB
2004
ACM
144views Database» more  VLDB 2004»
15 years 8 months ago
Returning Modified Rows - SELECT Statements with Side Effects
SQL in the IBM® DB2® Universal Database™ for Linux®, UNIX®, and Windows® (DB2 UDB) database management product has been extended to support nested INSERT, UPDATE, and DELET...
Andreas Behm, Serge Rielau, Richard Swagerman
INFOVIS
2002
IEEE
15 years 8 months ago
InterRing: An Interactive Tool for Visually Navigating and Manipulating Hierarchical Structures
Radial, space-filling (RSF) techniques for hierarchy visualization have several advantages over traditional node-link diagrams, including the ability to efficiently use the disp...
Jing Yang, Matthew O. Ward, Elke A. Rundensteiner
DSN
2006
IEEE
15 years 7 months ago
Lucky Read/Write Access to Robust Atomic Storage
This paper establishes tight bounds on the best-case time-complexity of distributed atomic read/write storage implementations that tolerate worst-case conditions. We study asynchr...
Rachid Guerraoui, Ron R. Levy, Marko Vukolic
WSCG
2000
107views more  WSCG 2000»
15 years 4 months ago
Faster ASV Decomposition for Orthogonal Polyhedra, Using the Extreme Vertices Model (EVM)
The alternating sum of volumes (ASV) decomposition is a widely used technique for converting a b-rep into a CSG model, with all its implicit uses and advantages -like form feature...
Antonio Aguilera, Dolors Ayala
150
Voted
BMCBI
2005
94views more  BMCBI 2005»
15 years 3 months ago
Workflows in bioinformatics: meta-analysis and prototype implementation of a workflow generator
Background: Computational methods for problem solving need to interleave information access and algorithm execution in a problem-specific workflow. The structures of these workflo...
Alexander García Castro, Samuel Thoraval, L...