Sciweavers

7607 search results - page 1520 / 1522
» Querying data provenance
Sort
View
ASIACRYPT
2011
Springer
12 years 6 months ago
Functional Encryption for Inner Product Predicates from Learning with Errors
We propose a lattice-based functional encryption scheme for inner product predicates whose security follows from the difficulty of the learning with errors (LWE) problem. This co...
Shweta Agrawal, David Mandell Freeman, Vinod Vaiku...
POPL
2012
ACM
12 years 1 months ago
A compiler and run-time system for network programming languages
Software-defined networks (SDNs) are a new implementation architecture in which a controller machine manages a distributed collection of switches, by instructing them to install ...
Christopher Monsanto, Nate Foster, Rob Harrison, D...
SIGCOMM
2012
ACM
11 years 8 months ago
CarSpeak: a content-centric network for autonomous driving
This paper introduces CarSpeak, a communication system for autonomous driving. CarSpeak enables a car to query and access sensory information captured by other cars in a manner si...
Swarun Kumar, Lixin Shi, Nabeel Ahmed, Stephanie G...
CVPR
2012
IEEE
11 years 8 months ago
Multi-attribute spaces: Calibration for attribute fusion and similarity search
Recent work has shown that visual attributes are a powerful approach for applications such as recognition, image description and retrieval. However, fusing multiple attribute scor...
Walter J. Scheirer, Neeraj Kumar, Peter N. Belhume...
SAS
2012
Springer
208views Formal Methods» more  SAS 2012»
11 years 8 months ago
Finding Non-terminating Executions in Distributed Asynchronous Programs
Programming distributed and reactive asynchronous systems is complex due to the lack of synchronization between concurrently executing tasks, and arbitrary delay of message-based c...
Michael Emmi, Akash Lal
« Prev « First page 1520 / 1522 Last » Next »