Sciweavers

8468 search results - page 1437 / 1694
» The Technology of Data Stashing
Sort
View
AES
2000
Springer
82views Cryptology» more  AES 2000»
15 years 3 months ago
Fast Implementations of AES Candidates
Of the five AES finalists four—MARS, RC6, Rijndael, Twofish— have not only (expected) good security but also exceptional performance on the PC platforms, especially on those...
Kazumaro Aoki, Helger Lipmaa
CIKM
2000
Springer
15 years 3 months ago
A Framework for Modeling Buffer Replacement Strategies
An e ective bu er management system is crucial for any database management system. While much work has been expended to provide extensible data types,extensible query languages an...
Stéphane Bressan, Chong Leng Goh, Beng Chin...
CIKM
2000
Springer
15 years 3 months ago
Object and Query Transformation: Supporting Multi-Dimensional Queries through Code Reuse
The complexity of deploying high-performance spatial structures in transactional DBMS environments has motivated researchers to experiment with the idea of reusing the effort inve...
Ratko Orlandic, Byunggu Yu
DAWAK
2000
Springer
15 years 3 months ago
Optimal Multidimensional Query Processing Using Tree Striping
In this paper, we propose a new technique for multidimensional query processing which can be widely applied in database systems. Our new technique, called tree striping, generalize...
Stefan Berchtold, Christian Böhm, Daniel A. K...
DAWAK
2000
Springer
15 years 3 months ago
COFE: A Scalable Method for Feature Extraction from Complex Objects
Abstract. Feature Extraction, also known as Multidimensional Scaling, is a basic primitive associated with indexing, clustering, nearest neighbor searching and visualization. We co...
Gabriela Hristescu, Martin Farach-Colton
« Prev « First page 1437 / 1694 Last » Next »