Sciweavers

103 search results - page 11 / 21
» An Arithmetic Library and Its Application to the N-body Prob...
Sort
View
96
Voted
COMPGEOM
2011
ACM
14 years 1 months ago
Deconstructing approximate offsets
We consider the offset-deconstruction problem: Given a polygonal shape Q with n vertices, can it be expressed, up to a tolerance ε in Hausdorff distance, as the Minkowski sum o...
Eric Berberich, Dan Halperin, Michael Kerber, Roza...
76
Voted
ICFP
2009
ACM
15 years 2 months ago
Experience report: embedded, parallel computer-vision with a functional DSL
This paper presents our experience using a domain-specific functional language, WaveScript, to build embedded sensing applications used in scientific research. We focus on a rec...
Ryan Newton, Teresa Ko
SDM
2008
SIAM
177views Data Mining» more  SDM 2008»
14 years 11 months ago
Practical Private Computation and Zero-Knowledge Tools for Privacy-Preserving Distributed Data Mining
In this paper we explore private computation built on vector addition and its applications in privacypreserving data mining. Vector addition is a surprisingly general tool for imp...
Yitao Duan, John F. Canny
75
Voted
MOBISYS
2004
ACM
15 years 9 months ago
An Architecture for Privacy-Sensitive Ubiquitous Computing
Privacy is the most often-cited criticism of ubiquitous computing, and may be the greatest barrier to its long-term success. However, developers currently have little support in d...
Jason I. Hong, James A. Landay
SIGMOD
2005
ACM
100views Database» more  SIGMOD 2005»
15 years 9 months ago
Events on the edge
The emergence of large-scale receptor-based systems has enabled applications to execute complex business logic over data generated from monitoring the physical world. An important...
Shariq Rizvi, Shawn R. Jeffery, Sailesh Krishnamur...