Sciweavers

7623 search results - page 1422 / 1525
» Constructive Volume Modeling
Sort
View
CGO
2010
IEEE
15 years 8 months ago
Taming hardware event samples for FDO compilation
Feedback-directed optimization (FDO) is effective in improving application runtime performance, but has not been widely adopted due to the tedious dual-compilation model, the difļ...
Dehao Chen, Neil Vachharajani, Robert Hundt, Shih-...
AFRICACRYPT
2010
Springer
15 years 8 months ago
Strong Cryptography from Weak Secrets
the full version of the extended abstract which appears in Africacrypt ’10 (3 – 6 may 2010, Stellenbosch, South Africa) D. Bernstein and T. Lange Eds., Springer-Verlag, LNCS 60...
Xavier Boyen, Céline Chevalier, Georg Fuchs...
SIGECOM
2010
ACM
201views ECommerce» more  SIGECOM 2010»
15 years 8 months ago
Truthful assignment without money
We study the design of truthful mechanisms that do not use payments for the generalized assignment problem (GAP) and its variants. An instance of the GAP consists of a bipartite g...
Shaddin Dughmi, Arpita Ghosh
136
Voted
MPC
2010
Springer
152views Mathematics» more  MPC 2010»
15 years 8 months ago
Lucy-n: a n-Synchronous Extension of Lustre
Synchronous functional languages such as Lustre or Lucid Synchrone define a restricted class of Kahn Process Networks which can be executed with no buffer. Every expression is as...
Louis Mandel, Florence Plateau, Marc Pouzet
ECCV
2010
Springer
15 years 7 months ago
Analyzing Depth from Coded Aperture Sets
Computational depth estimation is a central task in computer vision and graphics. A large variety of strategies have been introduced in the past relying on viewpoint variations, de...
« Prev « First page 1422 / 1525 Last » Next »