Akademska digitalna zbirka SLovenije - logo

Search results

Basic search    Advanced search   
Search
request
Library

Currently you are NOT authorised to access e-resources SI consortium. For full access, REGISTER.

1 2 3 4 5
hits: 117,184
1.
  • ALEX: An Updatable Adaptive... ALEX: An Updatable Adaptive Learned Index
    Ding, Jialin; Minhas, Umar Farooq; Yu, Jia ... Proceedings of the 2020 ACM SIGMOD International Conference on Management of Data, 06/2020
    Conference Proceeding
    Open access

    Recent work on "learned indexes" has changed the way we look at the decades-old field of DBMS indexing. The key idea is that indexes can be thought of as "models" that predict the position of a key ...
Full text
Available for: NUK, UL

PDF
2.
  • Data Structures for Computi... Data Structures for Computing Unique Palindromes in Static and Non-Static Strings
    Mieno, Takuya; Funakoshi, Mitsuru Algorithmica, 03/2024, Volume: 86, Issue: 3
    Journal Article
    Peer reviewed

    A palindromic substring T i .. j of a string T is said to be a shortest unique palindromic substring (SUPS) in T for an interval p ,  q if T i .. j is a shortest palindromic substring such that ...
Full text
Available for: EMUNI, FIS, FZAB, GEOZS, GIS, IJS, IMTLJ, KILJ, KISLJ, MFDPS, NLZOH, NUK, OILJ, PNG, SAZU, SBCE, SBJE, SBMB, SBNM, UKNU, UL, UM, UPUK, VKSCE, ZAGLJ
3.
  • Log(graph) Log(graph)
    Besta, Maciej; Stanojevic, Dimitri; Zivic, Tijana ... Proceedings of the 27th International Conference on Parallel Architectures and Compilation Techniques, 11/2018
    Conference Proceeding

    Today's graphs used in domains such as machine learning or social network analysis may contain hundreds of billions of edges. Yet, they are not necessarily stored efficiently, and standard graph ...
Full text
Available for: NUK, UL
4.
  • FITing-Tree FITing-Tree
    Galakatos, Alex; Markovitch, Michael; Binnig, Carsten ... Proceedings of the 2019 International Conference on Management of Data, 06/2019
    Conference Proceeding
    Open access

    Index structures are one of the most important tools that DBAs leverage to improve the performance of analytics and transactional workloads. However, building several indexes over large datasets can ...
Full text
Available for: NUK, UL

PDF
5.
  • Rainbow Connections of Graphs Rainbow Connections of Graphs
    Li, Xueliang; Sun, Yuefang 2012, 20120202, 2012-02-23
    eBook

    Rainbow connections are natural combinatorial measures that are used in applications to secure the transfer of classified information between agencies in communication networks. Rainbow Connections ...
Full text
Available for: FIS, FZAB, GEOZS, GIS, IJS, IMTLJ, KILJ, KISLJ, MFDPS, NUK, OBVAL, OILJ, PNG, SAZU, SBCE, SBJE, SBMB, SBNM, UKNU, UL, UM, UPUK, VKSCE, ZAGLJ
6.
  • Array programming with NumPy Array programming with NumPy
    Harris, Charles R; Millman, K Jarrod; van der Walt, Stéfan J ... Nature, 09/2020, Volume: 585, Issue: 7825
    Journal Article
    Peer reviewed
    Open access

    Array programming provides a powerful, compact and expressive syntax for accessing, manipulating and operating on data in vectors, matrices and higher-dimensional arrays. NumPy is the primary array ...
Full text
Available for: FZAB, GEOZS, IJS, IMTLJ, KILJ, KISLJ, MFDPS, NLZOH, NUK, OILJ, PNG, SAZU, SBCE, SBJE, SBMB, SBNM, UKNU, UL, UM, UPUK, VKSCE, ZAGLJ

PDF
7.
  • Lightweight High-Bandwidth ... Lightweight High-Bandwidth LiDAR-Inertial Odometry Employing Sparse Incremental Hash-Voxels
    Lin, Chiayang; Sun, Kejia; Zhao, Tianrui ... Journal of physics. Conference series, 07/2024, Volume: 2795, Issue: 1
    Journal Article
    Peer reviewed
    Open access

    Abstract This work introduces a lightweight LIO framework employing incremental voxels for enhanced efficiency. We leverage a sparse voxel data structure, replacing the tree structure in the ...
Full text
Available for: NUK, UL, UM, UPUK
8.
  • CertChain: Public and Efficient Certificate Audit Based on Blockchain for TLS Connections
    Chen, Jing; Yao, Shixiong; Yuan, Quan ... IEEE INFOCOM 2018 - IEEE Conference on Computer Communications, 2018-April
    Conference Proceeding

    In recent years, real-world attacks against PKI take place frequently. For example, malicious domains' certificates issued by compromised CAs are widespread, and revoked certificates are still ...
Full text
Available for: IJS, NUK, UL, UM
9.
  • Taichi Taichi
    Hu, Yuanming; Li, Tzu-Mao; Anderson, Luke ... ACM transactions on graphics, 11/2019, Volume: 38, Issue: 6
    Journal Article
    Peer reviewed

    3D visual computing data are often spatially sparse. To exploit such sparsity, people have developed hierarchical sparse data structures, such as multi-level sparse voxel grids, particles, and 3D ...
Full text
Available for: NUK, UL

PDF
10.
  • Dynamic provable data posse... Dynamic provable data possession
    Erway, Chris; Küpçü, Alptekin; Papamanthou, Charalampos ... Proceedings of the 16th ACM conference on Computer and communications security, 11/2009
    Conference Proceeding
    Open access

    We consider the problem of efficiently proving the integrity of data stored at untrusted servers. In the provable data possession (PDP) model, the client preprocesses the data and then sends it to an ...
Full text
Available for: NUK, UL

PDF
1 2 3 4 5
hits: 117,184

Load filters