Sciweavers

5344 search results - page 237 / 1069
» Privacy-Preserving Set Operations
Sort
View
125
Voted
OSDI
1994
ACM
15 years 5 months ago
HiPEC: High Performance External Virtual Memory Caching
Traditional operating systems use a xed LRU-like page replacement policy and centralized frame pool that cannot properly serve all types of memory access patterns of various appli...
Chao-Hsien Lee, Meng Chang Chen, Ruei-Chuan Chang
ICPR
2010
IEEE
15 years 4 months ago
Impact of Vector Ordering Strategies on Morphological Unmixing of Remotely Sensed Hyperspectral Images
Hyperspectral imaging is a new technique in remote sensing that generates hundreds of images, corresponding to different wavelength channels, for the same area on the surface of t...
Antonio Plaza, Javier Plaza
156
Voted
CGF
2010
146views more  CGF 2010»
15 years 3 months ago
Polygonal Boundary Evaluation of Minkowski Sums and Swept Volumes
We present a novel technique for the efficient boundary evaluation of sweep operations applied to objects in polygonal boundary representation. These sweep operations include Mink...
Marcel Campen, Leif Kobbelt
DC
2008
15 years 3 months ago
Solo-valency and the cost of coordination
This paper introduces solo-valency, a variation on the valency proof technique originated by Fischer, Lynch, and Paterson. The new technique focuses on critical events that influe...
Danny Hendler, Nir Shavit
102
Voted
FSS
2006
85views more  FSS 2006»
15 years 3 months ago
The logic of tied implications, part 2: Syntax
An implication operator A is said to be tied if there is a binary operation T that ties A; that is, the identity A(a, A(b, z)) = A(T (a, b), z) holds for all a, b, z. We aim at th...
Nehad N. Morsi, Wafik Boulos Lotfallah, Moataz Sal...