Results 291 to 300 of about 7,526,383 (337)
Some of the next articles are maybe not open access.
Memory-Efficient Key/Foreign-Key Join Size Estimation via Multiplicity and Intersection Size
2021 IEEE 37th International Conference on Data Engineering (ICDE), 2021Join size estimation plays a crucial role in query optimization. In this paper, we present a technique to estimate the size of a key/foreign-key join of two filtered relations. We build on a model by Allen Van Gelder, in which there is no notion of join selectivity.
Müller, Magnus +2 more
openaire +2 more sources
Particle size: the key to the atherogenic lipoprotein?
QJM, 1994Using different analytical methods, up to 12 low-density lipoprotein (LDL) subfractions can be separated. LDL particle size decreases with increasing density. Smaller, denser LDL particles seem more atherogenic than the larger, lighter particles, based on the experimental findings that smaller LDL particles are more susceptible for oxidation in vitro ...
M. J. Kendall +3 more
openaire +3 more sources
Designing Touch Screen Numeric Keypads: Effects of Finger Size, Key Size, and Key Spacing
Proceedings of the Human Factors and Ergonomics Society Annual Meeting, 1997Designing numeric keypads for point-of-sale devices to optimize keying speed and accuracy while efficiently utilizing touch screen real estate is a challenge. Existing design guidelines for touch screens are applicable to only specific classes of devices and fail to consider user variables such as finger size.
Vincent Conzola, Brenda Scott
openaire +2 more sources
Square Hash with a Small Key Size [PDF]
This paper shows an improvement of square hash function family proposed by Etzel et al. [5]. In the new variants, the size of keys is much shorter while the collision probability is slightly larger. Most of the main techniques used to optimize the original square hash functions work on our variants as well.
Kaoru Kurosawa, Swee-Huay Heng
openaire +1 more source
Slim Size Card Key Development
2012 IEEE 75th Vehicular Technology Conference (VTC Spring), 2012Key being used to identify & allow door access and engine start has been developed to the possibility of integration into the cellular phone with the help of increased electronics and wireless communication skill. But even all electrical function can replace conventional ones, it still need mechanical key blade for the case of emergency situation. From
Park Dongsik, Lee Ilyoung
openaire +2 more sources
Choosing key sizes for cryptography
Information Security Technical Report, 2010After making the decision to use public-key cryptography, an organisation still has to make many important decisions before a practical system can be implemented. One of the more difficult challenges is to decide the length of the keys which are to be used within the system: longer keys provide more security but mean that the cryptographic operation ...
openaire +1 more source
Size, age and innovativeness: Key determinants of growth?
2012 IEEE International Conference on Management of Innovation & Technology (ICMIT), 2012Young Innovative Companies (YIC) gained increasing attention from governments and scholars due to their expected high innovative performance and growth. Consequently, this study investigates whether Young Innovative Companies, as defined by the EU, grow more than other firms, both in terms of employment and in terms of sales.
Dirk Czarnitzki, J. Delanote
openaire +2 more sources

