Sciweavers

1801 search results - page 145 / 361
» Pointing without a pointer
Sort
View
ESORICS
2009
Springer
15 years 5 months ago
A Spatial Cloaking Framework Based on Range Search for Nearest Neighbor Search
For nearest neighbor search, a user queries a server for nearby points of interest (POIs) with his/her location information. Our aim is to protect the user’s sensitive informatio...
Hyoungshick Kim
ICC
2009
IEEE
169views Communications» more  ICC 2009»
15 years 5 months ago
Protocols and Resource Allocation for the Two-Way Relay Channel with Half-Duplex Terminals
—The two-way relay channel (TWRC) describes the communication between two terminals sharing a common relay. In this work we compare different protocols for the TWRC with a half-d...
Adrian Agustin, Josep Vidal, Olga Muñoz
78
Voted
NDSS
2009
IEEE
15 years 5 months ago
CSAR: A Practical and Provable Technique to Make Randomized Systems Accountable
We describe CSAR, a novel technique for generating cryptographically strong, accountable randomness. Using CSAR, we can generate a pseudo-random sequence and a proof that the elem...
Michael Backes, Peter Druschel, Andreas Haeberlen,...
IDA
2009
Springer
15 years 5 months ago
Blind Spectral-GMM Estimation for Underdetermined Instantaneous Audio Source Separation
Abstract. The underdetermined blind audio source separation problem is often addressed in the time-frequency domain by assuming that each time-frequency point is an independently d...
Simon Arberet, Alexey Ozerov, Rémi Gribonva...
ISVC
2009
Springer
15 years 5 months ago
Parallel Poisson Surface Reconstruction
In this work we describe a parallel implementation of the Poisson Surface Reconstruction algorithm based on multigrid domain decomposition. We compare implementations using differ...
Matthew Bolitho, Michael M. Kazhdan, Randal C. Bur...