Sciweavers

2904 search results - page 173 / 581
» Valuing Design Repair
Sort
View
CISC
2007
Springer
108views Cryptology» more  CISC 2007»
15 years 8 months ago
Verifiable Multi-secret Sharing Schemes for Multiple Threshold Access Structures
A multi-secret sharing scheme allows several secrets to be shared amongst a group of participants. In 2005, Shao and Cao developed a verifiable multi-secret sharing scheme where e...
Christophe Tartary, Josef Pieprzyk, Huaxiong Wang
AVI
2008
15 years 7 months ago
An empirical evaluation of interactive visualizations for preferential choice
Many critical decisions for individuals and organizations are often framed as preferential choices: the process of selecting the best option out of a set of alternatives. This pap...
Jeanette Bautista, Giuseppe Carenini
164
Voted
APVIS
2010
15 years 6 months ago
Volume visualization based on statistical transfer-function spaces
It is a difficult task to design transfer functions for noisy data. In traditional transfer-function spaces, data values of different materials overlap. In this paper we introduce...
Martin Haidacher, Daniel Patel, Stefan Bruckner, A...
PODS
2010
ACM
197views Database» more  PODS 2010»
15 years 5 months ago
When data dependencies over SQL tables meet the logics of paradox and S-3
We study functional and multivalued dependencies over SQL tables with NOT NULL constraints. Under a no-information interpretation of null values we develop tools for reasoning. We...
Sven Hartmann, Sebastian Link
MAM
2008
114views more  MAM 2008»
15 years 4 months ago
Asymmetrically banked value-aware register files for low-energy and high-performance
Designing high-performance low-energy register files is of critical importance to the continuation of current performance advances in wide-issue and deeply pipelined superscalar m...
Shuai Wang, Hongyan Yang, Jie S. Hu, Sotirios G. Z...