Sciweavers

5344 search results - page 869 / 1069
» Privacy-Preserving Set Operations
Sort
View
139
Voted
ICPR
2000
IEEE
16 years 4 months ago
Piecewise Linear Skeletonization Using Principal Curves
We propose an algorithm to find piecewise linear skeletons of hand-written characters by using principal curves. The development of the method was inspired by the apparent similar...
Adam Krzyzak, Balázs Kégl
124
Voted
SIGSOFT
2007
ACM
16 years 4 months ago
Programming asynchronous layers with CLARITY
Asynchronous systems components are hard to write, hard to reason about, and (not coincidentally) hard to mechanically verify. In order to achieve high performance, asynchronous c...
Prakash Chandrasekaran, Christopher L. Conway, Jos...
119
Voted
WWW
2008
ACM
16 years 4 months ago
Value-driven design for "infosuasive" web applications
An infosuasive web application is mainly intended to be at the same time informative and persuasive, i.e., it aims at supporting knowledge needs and it has also the (declared or n...
Davide Bolchini, Franca Garzotto, Paolo Paolini
129
Voted
WWW
2007
ACM
16 years 4 months ago
Semi-automated adaptation of service interactions
In today's Web, many functionality-wise similar Web services are offered through heterogeneous interfaces (operation definitions) and business protocols (ordering constraints...
Hamid R. Motahari Nezhad, Boualem Benatallah, Axel...
127
Voted
PPOPP
2009
ACM
16 years 4 months ago
Safe open-nested transactions through ownership
Researchers in transactional memory (TM) have proposed open nesting as a methodology for increasing the concurrency of transactional programs. The idea is to ignore "low-leve...
Kunal Agrawal, I.-Ting Angelina Lee, Jim Sukha