Sciweavers

1628 search results - page 292 / 326
» Compiler Construction Using Scheme
Sort
View
AGENTS
2000
Springer
14 years 2 days ago
Ant-like missionaries and cannibals: synthetic pheromones for distributed motion control
Many applied problems in domains such as military operations, manufacturing, and logistics require that entities change location under certain constraints. These problems are trad...
H. Van Dyke Parunak, Sven Brueckner
ASIACRYPT
2009
Springer
13 years 11 months ago
Proofs of Storage from Homomorphic Identification Protocols
Proofs of storage (PoS) are interactive protocols allowing a client to verify that a server faithfully stores a file. Previous work has shown that proofs of storage can be constru...
Giuseppe Ateniese, Seny Kamara, Jonathan Katz
CVPR
2009
IEEE
13 years 11 months ago
Keypoint induced distance profiles for visual recognition
We show that histograms of keypoint descriptor distances can make useful features for visual recognition. Descriptor distances are often exhaustively computed between sets of keyp...
Tat-Jun Chin, David Suter
COOPIS
2004
IEEE
13 years 11 months ago
Performance Evaluation of JXTA Rendezvous
Project JXTA is the first peer-to-peer application development infrastructure, consisting of standard protocols and multi-language implementations. A JXTA peer network is a comple...
Emir Halepovic, Ralph Deters, Bernard Traversat
CCS
2006
ACM
13 years 11 months ago
Secure information flow with random assignment and encryption
Type systems for secure information flow aim to prevent a program from leaking information from variables classified as H to variables classified as L. In this work we extend such...
Geoffrey Smith