Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 225,257,086 papers from all fields of science
Search
Sign In
Create Free Account
Precomputation
Known as:
Pre-computation
, Pre-computing
, Precomputed
Expand
In algorithms, precomputation is the act of performing an initial computation before run time to generate a lookup table that can be used by an…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
23 relations
Algorithmic efficiency
Approximation algorithm
CPU cache
Collision detection
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
Compressive Sensing encryption modes and their security
Robin M. Fay
,
C. Ruland
International Conference for Internet Technology…
2016
Corpus ID: 116799315
Compressed Sensing may offer confidentiality with a good level of security that comes at limited extra costs. By this means…
Expand
Highly Cited
2014
Highly Cited
2014
Segmentation-free word spotting with exemplar SVMs
Jon Almazán
,
Albert Gordo
,
A. Fornés
,
Ernest Valveny
Pattern Recognition
2014
Corpus ID: 17854204
Highly Cited
2014
Highly Cited
2014
Online Topic-aware Influence Maximization Queries
Çigdem Aslay
,
Nicola Barbieri
,
F. Bonchi
,
R. Baeza-Yates
International Conference on Extending Database…
2014
Corpus ID: 5437273
Influence maximization is the key algorithmic problem behind viral marketing: it requires to identify a set of influential users…
Expand
Highly Cited
2011
Highly Cited
2011
FPGA Implementations of the AES Masked Against Power Analysis Attacks
F. Regazzoni
,
Yi (Estelle) Wang
,
François-Xavier Standaert
2011
Corpus ID: 5752393
Power analysis attacks are a serious treat for implementations of modern cryptographic algorithms. Masking is a particularly…
Expand
Highly Cited
2005
Highly Cited
2005
Feature Combination and Relevance Feedback for 3D Model Retrieval
I. Atmosukarto
,
W. Leow
,
Zhiyong Huang
11th International Multimedia Modelling…
2005
Corpus ID: 7731442
Retrieval of 3D models have attracted much research interest, and many types of shape features have been proposed. In this paper…
Expand
Highly Cited
2003
Highly Cited
2003
Path-based protection for surviving double-link failures in mesh-restorable optical networks
Wensheng He
,
Arun Kumar Somani
GLOBECOM '03. IEEE Global Telecommunications…
2003
Corpus ID: 6253277
We consider path-based protection methods for two-link failures in mesh optical networks. Two link-disjoint backup paths are pre…
Expand
1997
1997
Data distribution algorithms for load balanced fault-tolerant Web access
B. Narendran
,
S. Rangarajan
,
S. Yajnik
Proceedings of SRDS'97: 16th IEEE Symposium on…
1997
Corpus ID: 12802898
Describes the design and analysis of RobustWeb, a scalable and fault-tolerant World Wide Web server cluster that is based on HTTP…
Expand
Highly Cited
1995
Highly Cited
1995
Computational Kinematic Analysis of Higher Pairs with Multiple Contacts
E. Sacks
,
Leo Joskowicz
1995
Corpus ID: 17730361
We present a computational kinematic theory of higher pairs with multiple contacts, including simultaneous contacts, intermittent…
Expand
Highly Cited
1989
Highly Cited
1989
Test set embedding in a built-in self-test environment
S. Akers
,
W. Jansz
Proceedings. 'Meeting the Tests of Time…
1989
Corpus ID: 26431414
The authors describe a built-in self-test (BIST) technique where the on-chip test pattern generator is a binary counter with…
Expand
Highly Cited
1981
Highly Cited
1981
Display Of Three-Dimensional Discrete Surfaces
G. Herman
,
J. Udupa
Other Conferences
1981
Corpus ID: 121542210
The currently-existing 3-D imaging technologies provide 3-D digital images of scenes in the form of 3-D arrays of numbers. In the…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE