Sciweavers

4761 search results - page 825 / 953
» Generalizing Boundary Points
Sort
View
115
Voted
TROB
2010
142views more  TROB 2010»
14 years 7 months ago
Extension of the Form-Closure Property to Underactuated Hands
The property of form-closure of a grasp, as generally defined in the literature, is based on the assumption that contact points between the hand and the object are fixed in space. ...
Sébastien Krut, Vincent Begoc, Etienne Domb...
134
Voted
PLDI
2011
ACM
14 years 3 months ago
Isolating and understanding concurrency errors using reconstructed execution fragments
In this paper we propose Recon, a new general approach to concurrency debugging. Recon goes beyond just detecting bugs, it also presents to the programmer short fragments of buggy...
Brandon Lucia, Benjamin P. Wood, Luis Ceze
CRYPTO
2011
Springer
207views Cryptology» more  CRYPTO 2011»
14 years 15 days ago
Secure Computation on the Web: Computing without Simultaneous Interaction
Secure computation enables mutually suspicious parties to compute a joint function of their private inputs while providing strong security guarantees. Amongst other things, even i...
Shai Halevi, Yehuda Lindell, Benny Pinkas
230
Voted
CL
2012
Springer
13 years 3 months ago
Object swapping challenges: An evaluation of imageSegment
In object-oriented systems, runtime memory is composed of an object graph in which objects refer to other objects. This graph of objects evolves while the system is running. Graph...
Mariano Martinez Peck, Noury Bouraqadi, Sté...
CRYPTO
2012
Springer
223views Cryptology» more  CRYPTO 2012»
13 years 3 months ago
Collusion-Preserving Computation
In collusion-free protocols, subliminal communication is impossible and parties are thus unable to communicate “any information beyond what the protocol allows”. Collusion-fre...
Joël Alwen, Jonathan Katz, Ueli Maurer, Vassi...