Sciweavers

1845 search results - page 237 / 369
» Computing the Angularity Tolerance
Sort
View
CVPR
2005
IEEE
15 years 1 months ago
Eye Gaze Tracking under Natural Head Movements
Most available remote eye gaze trackers based on Pupil Center Corneal Reflection (PCCR) technique have two characteristics that prevent them from being widely used as an important...
Zhiwei Zhu, Qiang Ji
FOCS
2008
IEEE
14 years 5 months ago
Leakage-Resilient Cryptography
We construct a stream-cipher SC whose implementation is secure even if a bounded amount of arbitrary (adaptively, adversarially chosen) information about the internal state of SC ...
Stefan Dziembowski, Krzysztof Pietrzak
ICDM
2003
IEEE
141views Data Mining» more  ICDM 2003»
14 years 4 months ago
Association Rule Mining in Peer-to-Peer Systems
We extend the problem of association rule mining – a key data mining problem – to systems in which the database is partitioned among a very large number of computers that are ...
Ran Wolff, Assaf Schuster
CLOUD
2010
ACM
14 years 4 months ago
Robust and flexible power-proportional storage
Power-proportional cluster-based storage is an important component of an overall cloud computing infrastructure. With it, substantial subsets of nodes in the storage cluster can b...
Hrishikesh Amur, James Cipar, Varun Gupta, Gregory...
SPAA
2010
ACM
14 years 4 months ago
Brief announcement: byzantine agreement with homonyms
In this work, we address Byzantine agreement in a message passing system with homonyms, i.e. a system with a number l of authenticated identities that is independent of the total ...
Carole Delporte-Gallet, Hugues Fauconnier, Rachid ...