Sciweavers

4000 search results - page 160 / 800
» Simulation down under
Sort
View
124
Voted
CCS
2009
ACM
15 years 10 months ago
A security-preserving compiler for distributed programs: from information-flow policies to cryptographic mechanisms
We enforce information flow policies in programs that run at multiple locations, with diverse levels of security. We build a compiler from a small imperative language with locali...
Cédric Fournet, Gurvan Le Guernic, Tamara R...
121
Voted
SCALESPACE
2009
Springer
15 years 10 months ago
Pre-image as Karcher Mean Using Diffusion Maps: Application to Shape and Image Denoising
In the context of shape and image modeling by manifold learning, we focus on the problem of denoising. A set of shapes or images being known through given samples, we capture its s...
Nicolas Thorstensen, Florent Ségonne, Renau...
130
Voted
IAT
2008
IEEE
15 years 10 months ago
Beyond Quasi-linear Utility: Strategy/False-Name-Proof Multi-unit Auction Protocols
We develop strategy/false-name-proof multi-unit auction protocols for non-quasi-linear utilities. One almost universal assumption in auction theory literature is that each bidder ...
Yuko Sakurai, Yasumasa Saito, Atsushi Iwasaki, Mak...
128
Voted
CEC
2007
IEEE
15 years 10 months ago
On some symmetry based validity indices
—Identification of the correct number of clusters and the corresponding partitioning are two important considerations in clustering. In this paper, a newly developed point symme...
Sriparna Saha, Sanghamitra Bandyopadhyay
113
Voted
INFOCOM
2007
IEEE
15 years 10 months ago
Information Survival Threshold in Sensor and P2P Networks
— Consider a network of, say, sensors, or P2P nodes, or bluetooth-enabled cell-phones, where nodes transmit information to each other and where links and nodes can go up or down....
Deepayan Chakrabarti, Jure Leskovec, Christos Falo...