Sciweavers

67 search results - page 10 / 14
» A Quantitative Approach to Reductions in Secure Computation
Sort
View
CHI
2010
ACM
14 years 2 months ago
UpStream: motivating water conservation with low-cost water flow sensing and persuasive displays
Water is our most precious and most rapidly declining natural resource. We explore pervasive technology as an approach for promoting water conservation in public and private space...
Stacey Kuznetsov, Eric Paulos
ICDCS
2008
IEEE
14 years 1 months ago
Correlation-Aware Object Placement for Multi-Object Operations
A multi-object operation incurs communication or synchronization overhead when the requested objects are distributed over different nodes. The object pair correlations (the probab...
Ming Zhong, Kai Shen, Joel I. Seiferas
IEEEARES
2008
IEEE
14 years 1 months ago
Reliability Analysis using Graphical Duration Models
Reliability analysis has become an integral part of system design and operating. This is especially true for systems performing critical tasks such as mass transportation systems....
Roland Donat, Laurent Bouillaut, Patrice Aknin, Ph...
MICCAI
2009
Springer
14 years 8 months ago
A Fuzzy Region-Based Hidden Markov Model for Partial-Volume Classification in Brain MRI
We present a novel fuzzy region-based hidden Markov model (frbHMM) for unsupervised partial-volume classification in brain magnetic resonance images (MRIs). The primary contributio...
Albert Huang, Rafeef Abugharbieh, Roger Tam
CCS
2007
ACM
13 years 11 months ago
Highly efficient techniques for network forensics
Given a history of packet transmissions and an excerpt of a possible packet payload, the payload attribution problem requires the identification of sources, destinations and the t...
Miroslav Ponec, Paul Giura, Hervé Brön...