Sciweavers

5344 search results - page 331 / 1069
» Privacy-Preserving Set Operations
Sort
View
143
Voted
ISLPED
2007
ACM
123views Hardware» more  ISLPED 2007»
15 years 6 months ago
Approximation algorithms for power minimization of earliest deadline first and rate monotonic schedules
We address power minimization of earliest deadline first and ratemonotonic schedules by voltage and frequency scaling. We prove that the problems are NP-hard, and present (1+ ) f...
Sushu Zhang, Karam S. Chatha, Goran Konjevod
ECIR
2010
Springer
15 years 6 months ago
Query Performance Prediction: Evaluation Contrasted with Effectiveness
Query performance predictors are commonly evaluated by reporting correlation coefficients to denote how well the methods perform at predicting the retrieval performance of a set of...
Claudia Hauff, Leif Azzopardi, Djoerd Hiemstra, Fr...
CGF
2010
179views more  CGF 2010»
15 years 4 months ago
Binary Orientation Trees for Volume and Surface Reconstruction from Unoriented Point Clouds
Given a complete unoriented point set, we propose a binary orientation tree (BOT) for volume and surface representation, which roughly splits the space into the interior and exter...
Yi-Ling Chen, Bing-Yu Chen, Shang-Hong Lai, Tomoyu...
ENTCS
2010
66views more  ENTCS 2010»
15 years 4 months ago
A Nominal Relational Model for Local Store
The theory of nominal sets is a theory for names, freshness and binders. It has recently been suggested as a framework for modelling local store because it allows for a more eleme...
Rasmus Ejlers Møgelberg
AUTOMATICA
2006
166views more  AUTOMATICA 2006»
15 years 4 months ago
On admissible pairs and equivalent feedback - Youla parameterization in iterative learning control
This paper revisits a well-known synthesis problem in iterative learning control, where the objective is to optimize a performance criterion over a class of causal iterations. The...
Mark Verwoerd, Gjerrit Meinsma, Theo de Vries