Sciweavers

668 search results - page 76 / 134
» Implementing and Evaluating Automatic Checkpointing
Sort
View
CCS
2010
ACM
14 years 10 months ago
TASTY: tool for automating secure two-party computations
Secure two-party computation allows two untrusting parties to jointly compute an arbitrary function on their respective private inputs while revealing no information beyond the ou...
Wilko Henecka, Stefan Kögl, Ahmad-Reza Sadegh...
JAIR
1998
89views more  JAIR 1998»
14 years 9 months ago
An Empirical Approach to Temporal Reference Resolution
Scheduling dialogs, during which people negotiate the times of appointments, are common in everyday life. This paper reports the results of an in-depth empirical investigation of ...
Janyce Wiebe, Thomas P. O'Hara, Thorsten Öhrs...
ISBI
2004
IEEE
15 years 10 months ago
Enhanced Snake-Based Segmentation of Vocal Folds
We present a system to segment the medial edges of the vocal folds from stroboscopic video. The system has two components. The first learns a color transformation that optimally d...
Sonya Allin, John M. Galeotti, George D. Stetten, ...
ICCAD
2008
IEEE
140views Hardware» more  ICCAD 2008»
15 years 6 months ago
Correct-by-construction microarchitectural pipelining
— This paper presents a method for correct-by-construction microarchitectural pipelining that handles cyclic systems with dependencies between iterations. Our method combines pre...
Timothy Kam, Michael Kishinevsky, Jordi Cortadella...
WFLP
2009
Springer
277views Algorithms» more  WFLP 2009»
15 years 4 months ago
Termination of Context-Sensitive Rewriting with Built-In Numbers and Collection Data Structures
Context-sensitive rewriting is a restriction of rewriting that can be used to elegantly model declarative specification and programming languages such as Maude. Furthermore, it ca...
Stephan Falke, Deepak Kapur