Sciweavers

5344 search results - page 238 / 1069
» Privacy-Preserving Set Operations
Sort
View
CGA
2005
15 years 3 months ago
Bounded Blending for Function-Based Shape Modeling
We propose new analytical formulations of bounded blending operations for the function-based constructive shape modeling. The blending set operations are defined using R-functions...
Galina Pasko, Alexander A. Pasko, Tosiyasu L. Kuni...
AIEDAM
2000
134views more  AIEDAM 2000»
15 years 3 months ago
Adaptive enlargement of state spaces in evolutionary designing
In designing a state space of possible designs is implied by the representation used and the computational processes that operate on that representation. GAs are a means of effect...
John S. Gero, Vladimir A. Kazakov
CSUR
1998
99views more  CSUR 1998»
15 years 3 months ago
Multidimensional Access Methods
Search operations in databases require some special support at the physical level. This is true for conventional databases as well as for spatial databases, where typical search o...
Volker Gaede, Oliver Günther
CORR
2010
Springer
97views Education» more  CORR 2010»
15 years 2 months ago
Towards a Collision-Free WLAN: Dynamic Parameter Adjustment in CSMA/E2CA
Abstract—Carrier Sense Multiple Access with Enhanced Collision Avoidance (CSMA/ECA) is a distributed MAC protocol that allows collision-free access to the medium in WLAN. The onl...
Jaume Barceló, Boris Bellalta, Cristina Can...
JAPLL
2010
98views more  JAPLL 2010»
15 years 2 months ago
On database query languages for K-relations
The relational model has recently been extended to so-called K-relations in which tuples are assigned a unique value in a semiring K. A query language, denoted by RAC K , similar ...
Floris Geerts, Antonella Poggi