Sciweavers

4411 search results - page 58 / 883
» Communication Complexity and Its Applications
Sort
View
IJCV
2002
143views more  IJCV 2002»
13 years 9 months ago
Trinocular Stereo: A Real-Time Algorithm and its Evaluation
In telepresence applications each user is immersed in a rendered 3D-world composed from representations transmitted from remote sites. The challenge is to compute dense range data...
Jane Mulligan, Volkan Isler, Konstantinos Daniilid...
ISPDC
2005
IEEE
14 years 3 months ago
Active Zero-copy: A performance study of non-deterministic messaging
Zero-copy communication exchanges the messages among the buffers that are allocated and locked before the communication itself. This communication style fits into applications th...
Shinichi Yamagiwa, Keiichi Aoki, Koichi Wada
ICFP
2006
ACM
14 years 10 months ago
A technique for generic iteration and its optimization
Software libraries rely increasingly on iterators to provide generic traversal of data structures. These iterators can be represented either as objects that maintain state or as p...
Stephen M. Watt
EUROCRYPT
1997
Springer
14 years 2 months ago
The GCHQ Protocol and Its Problems
The UK government is fielding an architecture for secure electronic mail based on the NSA’s Message Security Protocol, with a key escrow scheme inspired by Diffie-Hellman. Attem...
Ross J. Anderson, Michael Roe
CORR
2011
Springer
147views Education» more  CORR 2011»
13 years 5 months ago
Human-Assisted Graph Search: It's Okay to Ask Questions
We consider the problem of human-assisted graph search: given a directed acyclic graph with some (unknown) target node(s), we consider the problem of finding the target node(s) b...
Aditya G. Parameswaran, Anish Das Sarma, Hector Ga...