Sciweavers

1509 search results - page 289 / 302
» Depth from Scattering
Sort
View
COCO
2009
Springer
155views Algorithms» more  COCO 2009»
14 years 2 months ago
Weak Derandomization of Weak Algorithms: Explicit Versions of Yao's Lemma
—A simple averaging argument shows that given a randomized algorithm A and a function f such that for every input x, Pr[A(x) = f(x)] ≥ 1−ρ (where the probability is over the...
Ronen Shaltiel
IMC
2009
ACM
14 years 2 months ago
Network level footprints of facebook applications
With over half a billion users, Online Social Networks (OSNs) are the major new applications on the Internet. Little information is available on the network impact of OSNs, althou...
Atif Nazir, Saqib Raza, Dhruv Gupta, Chen-Nee Chua...
INTERACTION
2009
ACM
14 years 2 months ago
Temporal-spatial association analysis of ocean salinity and temperature variations
Ocean circulation plays an important role in global climate change. In an effort to monitor ocean circulation an infrastructure of more than 3,000 buoys have been deployed in the ...
Yo-Ping Huang, Jung-Shian Jau, Frode Eika Sandnes
INFOCOM
2008
IEEE
14 years 2 months ago
CTU: Capturing Throughput Dependencies in UWB Networks
—The inherent channel characteristics of impulse-based UWB networks affect the MAC layer performance significantly. Previous studies on evaluating MAC protocols are based on pro...
Ioannis Broustis, Aggelos Vlavianos, Prashant Kris...
NDSS
2008
IEEE
14 years 2 months ago
Analysis-Resistant Malware
Traditionally, techniques for computing on encrypted data have been proposed with privacy preserving applications in mind. Several current cryptosystems support a homomorphic oper...
John Bethencourt, Dawn Song, Brent Waters