Sciweavers

4397 search results - page 276 / 880
» Relational Algebra Operations
Sort
View
ACNS
2011
Springer
231views Cryptology» more  ACNS 2011»
14 years 8 months ago
Cold Boot Key Recovery by Solving Polynomial Systems with Noise
A method for extracting cryptographic key material from DRAM used in modern computers has been recently proposed in [9]; the technique was called Cold Boot attacks. When considerin...
Martin Albrecht, Carlos Cid
ER
2011
Springer
265views Database» more  ER 2011»
14 years 4 months ago
Modeling the Propagation of User Preferences
Abstract. User preferences are a fundamental ingredient of personalized database applications, in particular those in which the user context plays a key role. Given a set of prefer...
Paolo Ciaccia, Riccardo Torlone
ISBI
2004
IEEE
16 years 5 months ago
Diffusion Smoothing on Brain Surface via Finite Element Method
Surface data such as the segmented cortical surface of the human brain plays an important role in medical imaging. To increase the signal-to-noise ratio for data residing on the b...
Moo Chung, Jonathan Taylor
142
Voted
PPAM
2007
Springer
15 years 10 months ago
Parallel Tiled QR Factorization for Multicore Architectures
As multicore systems continue to gain ground in the High Performance Computing world, linear algebra algorithms have to be reformulated or new algorithms have to be developed in or...
Alfredo Buttari, Julien Langou, Jakub Kurzak, Jack...
SPAA
2006
ACM
15 years 10 months ago
Towards automatic parallelization of tree reductions in dynamic programming
Tree contraction algorithms, whose idea was first proposed by Miller and Reif, are important parallel algorithms to implement efficient parallel programs manipulating trees. Desp...
Kiminori Matsuzaki, Zhenjiang Hu, Masato Takeichi