Sciweavers

3305 search results - page 107 / 661
» Can we Rely on SQL
Sort
View
PVLDB
2008
182views more  PVLDB 2008»
13 years 9 months ago
SCOPE: easy and efficient parallel processing of massive data sets
Companies providing cloud-scale services have an increasing need to store and analyze massive data sets such as search logs and click streams. For cost and performance reasons, pr...
Ronnie Chaiken, Bob Jenkins, Per-Åke Larson,...
ASIACRYPT
2009
Springer
14 years 1 months ago
Hedged Public-Key Encryption: How to Protect against Bad Randomness
Abstract. Public-key encryption schemes rely for their IND-CPA security on per-message fresh randomness. In practice, randomness may be of poor quality for a variety of reasons, le...
Mihir Bellare, Zvika Brakerski, Moni Naor, Thomas ...
PERCOM
2007
ACM
14 years 9 months ago
Macro Programming through Bayesian Networks: Distributed Inference and Anomaly Detection
Macro programming a distributed system, such as a sensor network, is the ability to specify application tasks at a global level while relying on compiler-like software to translat...
Marco Mamei, Radhika Nagpal
CDC
2008
IEEE
144views Control Systems» more  CDC 2008»
14 years 4 months ago
Decentralized predictive sensor allocation
Abstract— We present a method of dynamic coalition formation (DCF) in sensor networks to achieve well-informed sensor-target allocations. Forecasts of target movements are incorp...
Mark Ebden, Mark Briers, Stephen Roberts
ISMAR
2008
IEEE
14 years 4 months ago
The haunted book
This paper describes an artwork that relies on recent Computer Vision and Augmented Reality techniques to animate the illustrations of a poetry book. Because we don’t need marke...
Camille Scherrer, Julien Pilet, Pascal Fua, Vincen...