Sciweavers

433 search results - page 44 / 87
» Administrative and Public Verifiability: Can We Have Both
Sort
View
ICICS
2007
Springer
13 years 11 months ago
Time and Space Efficient Algorithms for Two-Party Authenticated Data Structures
Authentication is increasingly relevant to data management. Data is being outsourced to untrusted servers and clients want to securely update and query their data. For example, in ...
Charalampos Papamanthou, Roberto Tamassia
ICDE
2009
IEEE
121views Database» more  ICDE 2009»
14 years 9 months ago
Large-Scale Deduplication with Constraints Using Dedupalog
We present a declarative framework for collective deduplication of entity references in the presence of constraints. Constraints occur naturally in many data cleaning domains and c...
Arvind Arasu, Christopher Ré, Dan Suciu
CVPR
2005
IEEE
14 years 9 months ago
Strike a Pose: Tracking People by Finding Stylized Poses
We develop an algorithm for finding and kinematically tracking multiple people in long sequences. Our basic assumption is that people tend to take on certain canonical poses, even...
Deva Ramanan, David A. Forsyth, Andrew Zisserman
ITICSE
1997
ACM
13 years 11 months ago
Computer managed, open question, open book assessment
This paper describes the development and use of practical examinations which include a significant element of software control of the administrative process. The educational metho...
John Rosbottom
ICC
2007
IEEE
239views Communications» more  ICC 2007»
14 years 1 months ago
Measuring WCDMA and HSDPA Delay Characteristics with QoSMeT
—Quality of Service (QoS) is becoming increasingly important with the rise of multimedia applications (e.g., voice over IP (VoIP), video conferencing, online gaming, and Internet...
Jarmo Prokkola, Mikko Hanski, Marko Jurvansuu, Mil...