Sciweavers

3778 search results - page 104 / 756
» Erdos-Ko-Rado for three sets
Sort
View
MFCS
2007
Springer
15 years 10 months ago
Nearly Private Information Retrieval
A private information retrieval scheme is a protocol whereby a client obtains a record from a database without the database operators learning anything about which record the clien...
Amit Chakrabarti, Anna Shubina
AVSS
2006
IEEE
15 years 10 months ago
Real-Time Detection of Camera Tampering
This paper presents a novel technique for camera tampering detection. It is implemented in real-time and was developed for use in surveillance and security applications. This meth...
Evan Ribnick, Stefan Atev, Osama Masoud, Nikolaos ...
DATE
2006
IEEE
112views Hardware» more  DATE 2006»
15 years 10 months ago
Simultaneously improving code size, performance, and energy in embedded processors
Code size and energy consumption are critical design concerns for embedded processors as they determine the cost of the overall system. Techniques such as reduced length instructi...
Ahmad Zmily, Christos Kozyrakis
GLOBECOM
2006
IEEE
15 years 10 months ago
Bandwidth Constraint Models: A Performance Study with Preemption on Link Failures
— Bandwidth constraint models have been a topic of intense discussions at the IETF meetings. Three conventional methods have been described in informational IETF RFCs and their p...
Joshua B. Goldberg, Sukrit Dasgupta, Jaudelice Cav...
IROS
2006
IEEE
113views Robotics» more  IROS 2006»
15 years 10 months ago
A Framework for Automatic Deployment of Robots in 2D and 3D Environments
Abstract— We present a computational framework for automatic deployment of robots in 2D and 3D rectangular environments with polytopal obstacles. The results are derived for poly...
Marius Kloetzer, Calin Belta