Sciweavers

5344 search results - page 222 / 1069
» Privacy-Preserving Set Operations
Sort
View
118
Voted
PLDI
2012
ACM
13 years 6 months ago
Concurrent data representation synthesis
We describe an approach for synthesizing data representations for concurrent programs. Our compiler takes as input a program written using concurrent relations and synthesizes a r...
Peter Hawkins, Alex Aiken, Kathleen Fisher, Martin...
121
Voted
ICANNGA
2009
Springer
130views Algorithms» more  ICANNGA 2009»
15 years 10 months ago
String Distances and Uniformities
Abstract. The Levenstein or edit distance was developed as a metric for calculating distances between character strings. We are looking at weighting the different edit operations (...
David W. Pearson, Jean-Christophe Janodet
117
Voted
RELMICS
2009
Springer
15 years 10 months ago
Contact Relations with Applications
Using relation algebra, we generalize Aumann’s notion of a contact relation and that of a closure operation from powersets to general membership relations and their induced parti...
Gunther Schmidt, Rudolf Berghammer
131
Voted
NOMS
2008
IEEE
15 years 10 months ago
Towards an efficient implementation of traceback mechanisms in autonomous systems
—One of the major problems due to denial of service attacks is the identification of fault packets. To resolve this problem, several IP traceback methods have been defined. In th...
Karima Boudaoud, F. LeBorgne
115
Voted
ESA
2007
Springer
99views Algorithms» more  ESA 2007»
15 years 10 months ago
Linear-Time Ranking of Permutations
Abstract. A lexicographic ranking function for the set of all permutations of n ordered symbols translates permutations to their ranks in the lexicographic order of all permutation...
Martin Mares, Milan Straka