Sciweavers

4870 search results - page 918 / 974
» Construction of Wavelets and Applications
Sort
View
3DPVT
2002
IEEE
128views Visualization» more  3DPVT 2002»
14 years 21 days ago
Towards Automatic Modeling of Monuments and Towers
Three-dimensional modeling from images, when carried out entirely by a human, can be time consuming and impractical for large-scale projects. On the other hand, full automation ma...
Sabry F. El-Hakim, J.-Angelo Beraldin, Jean-Fran&c...
ISESE
2002
IEEE
14 years 19 days ago
Elimination of Crucial Faults by a New Selective Testing Method
Recent software systems contain a lot of functions to provide various services. According to this tendency, software testing becomes more difficult than before and cost of testing...
Masayuki Hirayama, Tetsuya Yamamoto, Jiro Okayasu,...
STOC
2010
ACM
199views Algorithms» more  STOC 2010»
14 years 17 days ago
Zero-One Frequency Laws
Data streams emerged as a critical model for multiple applications that handle vast amounts of data. One of the most influential and celebrated papers in streaming is the “AMS...
Vladimir Braverman and Rafail Ostrovsky
STOC
2010
ACM
227views Algorithms» more  STOC 2010»
14 years 17 days ago
On the Round Complexity of Covert Computation
In STOC’05, von Ahn, Hopper and Langford introduced the notion of covert computation. In covert computation, a party runs a secure computation protocol over a covert (or stegano...
Vipul Goyal and Abhishek Jain
SIGMOD
2010
ACM
227views Database» more  SIGMOD 2010»
14 years 16 days ago
SecureBlox: customizable secure distributed data processing
We present SecureBlox, a declarative system that unifies a distributed query processor with a security policy framework. SecureBlox decouples security concerns from system speci...
William R. Marczak, Shan Shan Huang, Martin Braven...