Sciweavers

3116 search results - page 237 / 624
» Recovering
Sort
View
104
Voted
USENIX
2007
15 years 3 months ago
Implementation and Performance Evaluation of Fuzzy File Block Matching
The fuzzy file block matching technique (fuzzy matching for short), was first proposed for opportunistic use of Content Addressable Storage. Fuzzy matching aims to increase the ...
Bo Han, Peter J. Keleher
115
Voted
AMDO
2008
Springer
15 years 2 months ago
Body-Part Templates for Recovery of 2D Human Poses under Occlusion
Detection of humans and estimation of their 2D poses from a single image are challenging tasks. This is especially true when part of the observation is occluded. However, given a l...
Ronald Poppe, Mannes Poel
101
Voted
APPROX
2008
Springer
100views Algorithms» more  APPROX 2008»
15 years 2 months ago
Corruption and Recovery-Efficient Locally Decodable Codes
A (q, , )-locally decodable code (LDC) C : {0, 1}n {0, 1}m is an encoding from n-bit strings to m-bit strings such that each bit xk can be recovered with probability at least 1 2 +...
David P. Woodruff
CANS
2008
Springer
111views Cryptology» more  CANS 2008»
15 years 2 months ago
Analysis and Design of Multiple Threshold Changeable Secret Sharing Schemes
In a (r, n)-threshold secret sharing scheme, no group of (r - 1) colluding members can recover the secret value s. However, the number of colluders is likely to increase over time...
Tiancheng Lou, Christophe Tartary
CC
2008
Springer
137views System Software» more  CC 2008»
15 years 2 months ago
On the Relative Completeness of Bytecode Analysis Versus Source Code Analysis
Abstract. We discuss the challenges faced by bytecode analyzers designed for code verification compared to similar analyzers for source code. While a bytecode-level analysis brings...
Francesco Logozzo, Manuel Fähndrich