Sciweavers

1728 search results - page 338 / 346
» The Accelerated Euclidean Algorithm
Sort
View
ASAP
2003
IEEE
124views Hardware» more  ASAP 2003»
15 years 2 months ago
Arbitrary Bit Permutations in One or Two Cycles
Symmetric-key block ciphers encrypt data, providing data confidentiality over the public Internet. For inter-operability reasons, it is desirable to support a variety of symmetric...
Zhijie Shi, Xiao Yang, Ruby B. Lee
67
Voted
PG
2003
IEEE
15 years 2 months ago
Automatic Animation Skeleton Construction Using Repulsive Force Field
A method is proposed in this paper to automatically generate the animation skeleton of a model such that the model can be manipulated according to the skeleton. With our method, u...
Pin-Chou Liu, Fu-Che Wu, Wan-Chun Ma, Rung-Huei Li...
SENSYS
2003
ACM
15 years 2 months ago
CODA: congestion detection and avoidance in sensor networks
Event-driven sensor networks operate under an idle or light load and then suddenly become active in response to a detected or monitored event. The transport of event impulses is l...
Chieh-Yih Wan, Shane B. Eisenman, Andrew T. Campbe...
EDBT
2010
ACM
149views Database» more  EDBT 2010»
15 years 2 months ago
Statistics-based parallelization of XPath queries in shared memory systems
The wide availability of commodity multi-core systems presents an opportunity to address the latency issues that have plaqued XML query processing. However, simply executing multi...
Rajesh Bordawekar, Lipyeow Lim, Anastasios Kements...
CIKM
2009
Springer
15 years 2 months ago
Probabilistic skyline queries
The ability to deal with uncertain information is becoming increasingly important for modern database applications. Whereas a conventional (certain) object is usually represented ...
Christian Böhm, Frank Fiedler, Annahita Oswal...