Sciweavers

1120 search results - page 77 / 224
» time 1999
Sort
View
COLT
1999
Springer
15 years 3 months ago
An Adaptive Version of the Boost by Majority Algorithm
We propose a new boosting algorithm. This boosting algorithm is an adaptive version of the boost by majority algorithm and combines bounded goals of the boost by majority algorith...
Yoav Freund
PKC
1999
Springer
96views Cryptology» more  PKC 1999»
15 years 3 months ago
How to Copyright a Function?
This paper introduces a method for tracking different copies of functionally equivalent algorithms containing identification marks known to the attacker. Unlike all previous solu...
David Naccache, Adi Shamir, Julien P. Stern
VLDB
1999
ACM
91views Database» more  VLDB 1999»
15 years 3 months ago
Probabilistic Optimization of Top N Queries
The problem of nding the best answers to a query quickly, rather than nding all answers, is of increasing importance as relational databases are applied in multimedia and decision...
Donko Donjerkovic, Raghu Ramakrishnan
81
Voted
ICDCS
1999
IEEE
15 years 3 months ago
Imprecise Calendars: an Approach to Scheduling Computational Grids
We describe imprecise calendars, a way to organize and schedule clusters of nodes in a computation grid. Imprecise calendars permit the easy and efficient sharing of resources bet...
Jeffrey K. Hollingsworth, Songrit Maneewongvatana
72
Voted
EDCC
1999
Springer
15 years 3 months ago
Transparent Word-Oriented Memory BIST Based on Symmetric March Algorithms
Abstract. The paper presents a new approach to transparent BIST for wordoriented RAMs which is based on the transformation of March transparent test algorithms to the symmetric ver...
Vyacheslav N. Yarmolik, I. V. Bykov, Sybille Helle...