Sciweavers

5344 search results - page 272 / 1069
» Privacy-Preserving Set Operations
Sort
View
APLAS
2007
ACM
15 years 8 months ago
Complete Lattices and Up-To Techniques
Abstract. We propose a theory of up-to techniques for proofs by coinduction, in the setting of complete lattices. This theory improves over existing results by providing a way to c...
Damien Pous
PODC
2010
ACM
15 years 8 months ago
Brief announcement: tree decomposition for faster concurrent data structures
We show how to partition data structures representable by directed acyclic graphs, i.e. rooted trees, to allow for efficient complex operations, which lie beyond inserts, deletes ...
Johannes Schneider, Roger Wattenhofer
HOTOS
2007
IEEE
15 years 8 months ago
Relaxed Determinism: Making Redundant Execution on Multiprocessors Practical
Given that the majority of future processors will contain an abundance of execution cores, redundant execution can offer a promising method for increasing the availability and res...
Jesse Pool, Ian Sin Kwok Wong, David Lie
HOTOS
2009
IEEE
15 years 8 months ago
FLUXO: A Simple Service Compiler
In this paper, we propose FLUXO, a system that separates an Internet service's logical functionality from the architectural decisions made to support performance, scalability...
Emre Kiciman, V. Benjamin Livshits, Madanlal Musuv...
CRV
2004
IEEE
136views Robotics» more  CRV 2004»
15 years 7 months ago
An Optical-Inertial Tracking System for Fully-Enclosed VR Displays
This paper describes a hybrid optical-inertial tracking technology for fully-immersive projective displays. In order to track the operator, the operator wears a 3DOF commercial in...
A. R. Hogue, Michael R. M. Jenkin, Robert S. Allis...