نتایج جستجو برای: time cost tradeoff

تعداد نتایج: 2186414  

Journal: :IACR Cryptology ePrint Archive 2015
Jeremy Maitin-Shepard

Field inversion in F2m dominates the cost of modern software implementations of certain elliptic curve cryptographic operations, such as point encoding/hashing into elliptic curves. [7, 6, 2] Itoh–Tsujii inversion using a polynomial basis and precomputed table-based multi-squaring has been demonstrated to be highly effective for software implementations [19, 14, 2], but the performance and memo...

2018
Nieves R. Brisaboa Guillermo de Bernardo Gonzalo Navarro Tirso V. Rodeiro Diego Seco

We introduce a new technique for the efficient management of large sequences of multidimensional data, which takes advantage of regularities that arise in real-world datasets and supports different types of aggregation queries. More importantly, our representation is flexible in the sense that the relevant dimensions and queries may be used to guide the construction process, easily providing a ...

Journal: :Softw., Pract. Exper. 2017
Szymon Grabowski Robert Susik Marcin Raniszewski

We present a simple q-gram based semi-index, which allows to look for a pattern typically only in a small fraction of text blocks. Several space-time tradeoffs are presented. Experiments on Pizza & Chili datasets show that our solution is up to three orders of magnitude faster than the Claude et al. [4] semi-index at a comparable space usage.

Journal: :JSW 2016
Zhixiong Su Han-ying Wei Xue-Min Yu

Minimizing the project cost is a task of project scheduling, and usually is a starting point in the optimization about cost, for example the time-cost tradeoff is to compress the project duration from the one with minimum cost. Project cost can be minimized by letting all activities choose their minimum cost durations only when strict precedence relations exist between activities. But if genera...

2017
Radu Calinescu Milan Ceska Simos Gerasimou Marta Z. Kwiatkowska Nicola Paoletti

We introduce RODES – a tool for the synthesis of probabilistic systems that satisfy strict reliability and performance requirements, are Pareto-optimal with respect to a set of optimisation objectives, and are robust to variations in the system parameters. Given the design space of a system (modelled as a parametric continuous-time Markov chain), RODES generates system designs with low sensitiv...

Journal: :CoRR 2010
S. Prakasha R. Selvarani

A Data Warehouse stores integrated information as materialized views over data from one or more remote sources. These materialized views must be maintained in response to actual relation updates in the remote sources. The data warehouse view maintenance techniques are classified into four major categories self maintainable recomputation, not self maintainable recomputation, self maintainable in...

2017
David A. Basin Bhargav Nagaraja Bhatt Dmitriy Traytel

A monitoring algorithm is trace-length independent if its space consumption does not depend on the number of events processed. The analysis of many monitoring algorithms has aimed at establishing trace-length independence. But a trace-length independent monitor’s space consumption can depend on characteristics of the trace other than its size. We put forward the stronger notion of event-rate in...

2008
Robert Van Dam Irene Langkilde-Geary Dan Ventura

ADtrees, a data structure useful for caching sufficient statistics, have been successfully adapted to grow lazily when memory is limited and to update sequentially with an incrementally updated dataset. For low arity symbolic features, ADtrees trade a slight increase in query time for a reduction in overall tree size. Unfortunately, for high arity features, the same technique can often result i...

Journal: :CoRR 2010
Chow Kok Kent Naomie Salim

As the Internet help us cross cultural border by providing different information, plagiarism issue is bound to arise. As a result, plagiarism detection becomes more demanding in overcoming this issue. Different plagiarism detection tools have been developed based on various detection techniques. Nowadays, fingerprint matching technique plays an important role in those detection tools. However, ...

Journal: :Pattern Recognition 2023

Deep learning technology has made great progress in multi-view 3D reconstruction tasks. At present, the mainstream solutions adopt different ways to fusion features from several views. Among them, attention-based aggregation function performs relatively well and stably, however, it still an obvious shortcoming strong independence of each view during predicting weights for merging leads a lack a...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید