Sciweavers

4397 search results - page 365 / 880
» Relational Algebra Operations
Sort
View
PPDP
2010
Springer
15 years 3 months ago
Deriving predicate statistics in datalog
Database query optimizers rely on data statistics in selecting query execution plans. Similar query optimization techniques are desirable for deductive databases and, to make this...
Senlin Liang, Michael Kifer
ICITS
2009
15 years 2 months ago
Linear Threshold Multisecret Sharing Schemes
In a multisecret sharing scheme, several secret values are distributed among a set of n users, and each secret may have a different associated access structure. We consider here un...
Oriol Farràs, Ignacio Gracia, Sebasti&agrav...
BMVC
2010
15 years 4 days ago
Epipolar Constraints for Multiscale Matching
Many recent keypoint detectors associate a local scale (for multiscale detectors) or even a full affine frame (for affine-invariant detectors) to each detected keypoint. Although ...
Bill Triggs, Pashmina Bendale
SIAMNUM
2010
123views more  SIAMNUM 2010»
14 years 12 months ago
Critical Analysis of the Spanning Tree Techniques
Two algorithms based upon a tree-cotree decomposition, called in this paper spanning tree technique (STT) and generalized spanning tree technique (GSTT), have been shown to be usef...
Pawel Dlotko, Ruben Specogna
CALCO
2011
Springer
214views Mathematics» more  CALCO 2011»
14 years 5 months ago
Indexed Induction and Coinduction, Fibrationally
This paper extends the fibrational approach to induction and coinduction pioneered by Hermida and Jacobs, and developed by the current authors, in two key directions. First, we pr...
Clément Fumex, Neil Ghani, Patricia Johann