Sciweavers

9719 search results - page 1677 / 1944
» Inference for Multiplicative Models
Sort
View
IPPS
2009
IEEE
15 years 10 months ago
Competitive buffer management with packet dependencies
We introduce the problem of managing a FIFO buffer of bounded space, where arriving packets have dependencies among them. Our model is motivated by the scenario where large data f...
Alexander Kesselman, Boaz Patt-Shamir, Gabriel Sca...
IPPS
2009
IEEE
15 years 10 months ago
Work-first and help-first scheduling policies for async-finish task parallelism
Multiple programming models are emerging to address an increased need for dynamic task parallelism in applications for multicore processors and shared-address-space parallel compu...
Yi Guo, Rajkishore Barik, Raghavan Raman, Vivek Sa...
172
Voted
ISMAR
2009
IEEE
15 years 10 months ago
Mobile augmented reality based 3D snapshots
: In this paper, we present a mobile augmented reality application that is based on the acquisition of user-generated content obtained by 3D snapshotting. To take a 3D snapshot of ...
Peter Keitler, Frieder Pankratz, Björn Schwer...
CANS
2009
Springer
120views Cryptology» more  CANS 2009»
15 years 10 months ago
Improved Garbled Circuit Building Blocks and Applications to Auctions and Computing Minima
Abstract. We consider generic Garbled Circuit (GC)-based techniques for Secure Function Evaluation (SFE) in the semi-honest model. We describe efficient GC constructions for additi...
Vladimir Kolesnikov, Ahmad-Reza Sadeghi, Thomas Sc...
CANS
2009
Springer
136views Cryptology» more  CANS 2009»
15 years 10 months ago
Verifying Anonymous Credential Systems in Applied Pi Calculus
Abstract. Anonymous credentials are widely used to certify properties of a credential owner or to support the owner to demand valuable services, while hiding the user’s identity ...
Xiangxi Li, Yu Zhang, Yuxin Deng
« Prev « First page 1677 / 1944 Last » Next »