Sciweavers

502 search results - page 28 / 101
» Deploying a New Hash Algorithm
Sort
View
CVPR
2009
IEEE
15 years 6 months ago
Disambiguating the recognition of 3D objects
We propose novel algorithms for the detection, segmentation, recognition, and pose estimation of threedimensional objects. Our approach initially infers geometric primitives to de...
Gutemberg Guerra-Filho
COCO
2007
Springer
111views Algorithms» more  COCO 2007»
15 years 3 months ago
Efficient Arguments without Short PCPs
Current constructions of efficient argument systems combine a short (polynomial size) PCP with a cryptographic hashing technique. We suggest an alternative approach for this probl...
Yuval Ishai, Eyal Kushilevitz, Rafail Ostrovsky
PERCOM
2010
ACM
14 years 10 months ago
Connectivity monitoring in wireless sensor networks
Connectivity monitoring is useful in practical deployment of wireless sensor network. In order to understand the behavior and performance bottleneck, knowledge of the network conn...
Mingze Zhang, Mun Choon Chan, Akkihebbal L. Ananda
98
Voted
SOSP
2001
ACM
15 years 8 months ago
Wide-Area Cooperative Storage with CFS
The Cooperative File System (CFS) is a new peer-to-peer readonly storage system that provides provable guarantees for the efficiency, robustness, and load-balance of file storag...
Frank Dabek, M. Frans Kaashoek, David R. Karger, R...
DSN
2005
IEEE
15 years 5 months ago
Perturbation-Resistant and Overlay-Independent Resource Discovery
This paper realizes techniques supporting the position that strategies for resource location and discovery in distributed systems should be both perturbation-resistant and overlay...
Steven Y. Ko, Indranil Gupta