Sciweavers

1017 search results - page 135 / 204
» A General Model for Authenticated Data Structures
Sort
View
AUIC
2006
IEEE
14 years 3 months ago
User interface layout with ordinal and linear constraints
User interfaces as well as documents use tabular layout mechanisms. The HTML table construct and the GridBag layout in Java are typical examples. There are, however, shortcomings ...
Christof Lutteroth, Gerald Weber
CLOUD
2010
ACM
14 years 2 months ago
A self-organized, fault-tolerant and scalable replication scheme for cloud storage
Failures of any type are common in current datacenters, partly due to the higher scales of the data stored. As data scales up, its availability becomes more complex, while differe...
Nicolas Bonvin, Thanasis G. Papaioannou, Karl Aber...
ECCV
2008
Springer
14 years 10 months ago
Learning Optical Flow
Assumptions of brightness constancy and spatial smoothness underlie most optical flow estimation methods. In contrast to standard heuristic formulations, we learn a statistical mod...
Deqing Sun, Stefan Roth, J. P. Lewis, Michael J. B...
SIGMETRICS
2011
ACM
178views Hardware» more  SIGMETRICS 2011»
12 years 11 months ago
Soft error benchmarking of L2 caches with PARMA
The amount of charge stored in an SRAM cell shrinks rapidly with each technology generation thus increasingly exposing caches to soft errors. Benchmarking the FIT rate of caches d...
Jinho Suh, Mehrtash Manoochehri, Murali Annavaram,...
ACL
2009
13 years 6 months ago
Sentence diagram generation using dependency parsing
Dependency parsers show syntactic relations between words using a directed graph, but comparing dependency parsers is difficult because of differences in theoretical models. We de...
Elijah Mayfield