Sciweavers

5344 search results - page 868 / 1069
» Privacy-Preserving Set Operations
Sort
View
141
Voted
SIGCOMM
2012
ACM
13 years 6 months ago
User-level data center tomography
Measurement and inference in data centers present a set of opportunities and challenges distinct from the Internet domain. Existing toolsets may be perturbed or be mislead by issu...
Neil Alexander Twigg, Marwan Fayed, Colin Perkins,...
142
Voted
CAV
2012
Springer
231views Hardware» more  CAV 2012»
13 years 6 months ago
Incremental, Inductive CTL Model Checking
A SAT-based incremental, inductive algorithm for model checking CTL properties is proposed. As in classic CTL model checking, the parse graph of the property shapes the analysis. H...
Zyad Hassan, Aaron R. Bradley, Fabio Somenzi
193
Voted
PODC
2012
ACM
13 years 6 months ago
Brief announcement: a calculus of policy-based routing systems
The BGP (Border Gateway Protocol) is the single inter-domain routing protocol that enables network operators within each autonomous system (AS) to influence routing decisions by ...
Anduo Wang, Carolyn L. Talcott, Alexander J. T. Gu...
177
Voted
CVPR
2006
IEEE
16 years 5 months ago
Edge Suppression by Gradient Field Transformation Using Cross-Projection Tensors
We propose a new technique for edge-suppressing operations on images. We introduce cross projection tensors to achieve affine transformations of gradient fields. We use these tens...
Amit K. Agrawal, Ramesh Raskar, Rama Chellappa
173
Voted
VIS
2004
IEEE
169views Visualization» more  VIS 2004»
16 years 4 months ago
Rendering Implicit Flow Volumes
Traditional flow volumes construct an explicit geometrical or parametrical representation from the vector field. The geometry is updated interactively and then rendered using an u...
Daqing Xue, Caixia Zhang, Roger Crawfis