Sciweavers

1628 search results - page 196 / 326
» Compiler Construction Using Scheme
Sort
View
SEC
2004
15 years 6 months ago
Recursive Sandboxes: Extending Systrace To Empower Applications
The systrace system-call interposition mechanism has become a popular method for containing untrusted code through program-specific policies enforced by user-level daemons. We desc...
Aleksey Kurchuk, Angelos D. Keromytis
150
Voted
SODA
2004
ACM
137views Algorithms» more  SODA 2004»
15 years 6 months ago
The Bloomier filter: an efficient data structure for static support lookup tables
We introduce the Bloomier filter, a data structure for compactly encoding a function with static support in order to support approximate evaluation queries. Our construction gener...
Bernard Chazelle, Joe Kilian, Ronitt Rubinfeld, Ay...
140
Voted
FLAIRS
2000
15 years 6 months ago
Independence Semantics for BKBs
Bayesian KnowledgeBases (BKB)are a rule-based probabilistic modelthat extend BayesNetworks(BN), by allowing context-sensitive independenceand cycles in the directed graph. BKBshav...
Solomon Eyal Shimony, Eugene Santos Jr., Tzachi Ro...
COMPGEOM
2003
ACM
15 years 10 months ago
Controlled perturbation for arrangements of circles
Given a collection C of circles in the plane, we wish to construct the arrangement A(C) (namely the subdivision of the plane into vertices, edges and faces induced by C) using fl...
Dan Halperin, Eran Leiserowitz
ICIP
2002
IEEE
16 years 6 months ago
Optimal detector structure for DCT and subband domain watermarking
Most of the watermarking schemes that have been proposed until now employ a correlator in the detection stage. The current paper proposes a new detector scheme that can be applied...
Athanasios Nikolaidis, Ioannis Pitas