Sciweavers

5344 search results - page 927 / 1069
» Privacy-Preserving Set Operations
Sort
View
134
Voted
CRYPTO
1987
Springer
87views Cryptology» more  CRYPTO 1987»
15 years 6 months ago
How to Make Replicated Data Secure
Many distributed systems manage some form of long-lived data, such as files or data bases. The performance and fault-tolerance of such systems may be enhanced if the repositories ...
Maurice Herlihy, J. D. Tygar
111
Voted
SIGGRAPH
1987
ACM
15 years 6 months ago
Direct least-squares fitting of algebraic surfaces
In the course of developing a system for fitting smooth curves to camera input we have developed several direct (i.e. noniterative) methods for fitting a shape (line, circle, conic...
Vaughan R. Pratt
AIPS
2008
15 years 5 months ago
Fast Dynamic Scheduling of Disjunctive Temporal Constraint Networks through Incremental Compilation
Autonomous systems operating in real-world environments must plan, schedule, and execute missions while robustly adapting to uncertainty and disturbance. One way to mitigate the e...
Julie A. Shah, Brian C. Williams
CAV
2010
Springer
239views Hardware» more  CAV 2010»
15 years 5 months ago
Universal Causality Graphs: A Precise Happens-Before Model for Detecting Bugs in Concurrent Programs
Triggering errors in concurrent programs is a notoriously difficult task. A key reason for this is the behavioral complexity resulting from the large number of interleavings of op...
Vineet Kahlon, Chao Wang
ASSETS
2008
ACM
15 years 5 months ago
Hunting for headings: sighted labeling vs. automatic classification of headings
Proper use of headings in web pages can make navigation more efficient for blind web users by indicating semantic di visions in the page. Unfortunately, many web pages do not use ...
Jeremy T. Brudvik, Jeffrey P. Bigham, Anna Cavende...