Sciweavers

9842 search results - page 1573 / 1969
» Compositional timing analysis
Sort
View
MM
2005
ACM
110views Multimedia» more  MM 2005»
15 years 10 months ago
Photo LOI: browsing multi-user photo collections
The number of digital photographs is growing beyond the abilities of individuals to easily manage and understand their own photo collections. Photo LOI (Level of Interest) is a te...
Rahul Nair, Nick Reid, Marc Davis
SIGECOM
2005
ACM
92views ECommerce» more  SIGECOM 2005»
15 years 10 months ago
True costs of cheap labor are hard to measure: edge deletion and VCG payments in graphs
We address the problem of lowering the buyer’s expected payments in shortest path auctions, where the buyer’s goal is to purchase a path in a graph in which edges are owned by...
Edith Elkind
SIGMOD
2005
ACM
113views Database» more  SIGMOD 2005»
15 years 10 months ago
Robust and Fast Similarity Search for Moving Object Trajectories
An important consideration in similarity-based retrieval of moving object trajectories is the definition of a distance function. The existing distance functions are usually sensi...
Lei Chen 0002, M. Tamer Özsu, Vincent Oria
SPAA
2005
ACM
15 years 10 months ago
Decentralized algorithms using both local and random probes for P2P load balancing
We study randomized algorithms for placing a sequence of n nodes on a circle with unit perimeter. Nodes divide the circle into disjoint arcs. We desire that a newly-arrived node (...
Krishnaram Kenthapadi, Gurmeet Singh Manku
ACNS
2005
Springer
97views Cryptology» more  ACNS 2005»
15 years 10 months ago
Thompson's Group and Public Key Cryptography
Recently, several public key exchange protocols based on symbolic computation in non-commutative (semi)groups were proposed as a more efficient alternative to well established prot...
Vladimir Shpilrain, Alexander Ushakov
« Prev « First page 1573 / 1969 Last » Next »