Sciweavers

1787 search results - page 301 / 358
» Approximation Techniques for Spatial Data
Sort
View
CTRSA
2009
Springer
155views Cryptology» more  CTRSA 2009»
14 years 3 months ago
Cryptanalysis of CTC2
CTC is a toy cipher designed in order to assess the strength of algebraic attacks. While the structure of CTC is deliberately weak with respect to algebraic attacks, it was claimed...
Orr Dunkelman, Nathan Keller
ICSE
2009
IEEE-ACM
14 years 3 months ago
Lightweight fault-localization using multiple coverage types
Lightweight fault-localization techniques use program coverage to isolate the parts of the code that are most suspicious of being faulty. In this paper, we present the results of ...
Raúl A. Santelices, James A. Jones, Yanbing...
ICPR
2010
IEEE
14 years 3 months ago
Canonical Patterns of Oriented Topologies
—A common problem in many areas of behavioral research is the analysis of the large volume of data recorded during the execution of the tasks being studied. Recent work has propo...
Walter Mankowski, Ali Shokoufandeh, Dario Salvucci
MDM
2009
Springer
123views Communications» more  MDM 2009»
14 years 3 months ago
Operator Placement for Snapshot Multi-predicate Queries in Wireless Sensor Networks
— This work aims at minimize the cost of answering snapshot multi-predicate queries in high-communication-cost networks. High-communication-cost (HCC) networks is a family of net...
Georgios Chatzimilioudis, Huseyin Hakkoymaz, Nikos...
MMM
2008
Springer
206views Multimedia» more  MMM 2008»
14 years 3 months ago
Content Based Querying and Searching for 3D Human Motions
From cartoons to medical research world, from the field of arts to scientific visualization, everyone related to these areas have been continuously using 3D motion capture data. Qu...
Manoj M. Pawar, Gaurav N. Pradhan, Kang Zhang, Bal...