Sciweavers

9290 search results - page 1625 / 1858
» The Predictability of Data Values
Sort
View
WISE
2007
Springer
15 years 10 months ago
Optimization of Bounded Continuous Search Queries Based on Ranking Distributions
A common search problem in the World Wide Web concerns finding information if it is not known when the sources of information appear and how long sources will be available on the ...
Dirk Kukulenz, Nils Hoeller, Sven Groppe, Volker L...
DBPL
2007
Springer
136views Database» more  DBPL 2007»
15 years 10 months ago
Analysis of Imperative XML Programs
The widespread adoption of XML has led to programming languages that support XML as a first class construct. In this paper, we present a method for analyzing and optimizing impera...
Michael G. Burke, Igor Peshansky, Mukund Raghavach...
ICOIN
2007
Springer
15 years 10 months ago
On the Early Release of Burst-Control Packets in Optical Burst-Switched Networks
Abstract. In Optical Burst-Switched networks, the so-called BurstControl Packet is sent a given offset-time ahead of the optical data burst to advertise the imminent burst arrival...
José Alberto Hernández, Javier Araci...
PEPM
2007
ACM
15 years 10 months ago
Lowering: a static optimization technique for transparent functional reactivity
Functional Reactive Programming (frp) extends traditional functional programming with dataflow evaluation, making it possible to write interactive programs in a declarative style...
Kimberley Burchett, Gregory H. Cooper, Shriram Kri...
121
Voted
PKC
2007
Springer
125views Cryptology» more  PKC 2007»
15 years 10 months ago
Multiparty Computation for Interval, Equality, and Comparison Without Bit-Decomposition Protocol
Damg˚ard et al. [11] showed a novel technique to convert a polynomial sharing of secret a into the sharings of the bits of a in constant rounds, which is called the bit-decomposit...
Takashi Nishide, Kazuo Ohta
« Prev « First page 1625 / 1858 Last » Next »