The “amount” of knowledge is constantly growing. Technological advances more and more facilitate an access to knowledge in an anytime, anywhere, and anyhow manner. The provisi...
Manfred Bortenschlager, Lyndon J. B. Nixon, Robert...
The JavaTM programming language does not allow the programmer to influence memory management. An object is usually allocated on the heap and deallocated by the garbage collector ...
In this work we recover the 3D shape of mirroring objects such as mirrors, sunglasses, and stainless steel objects. A computer monitor displays several images of parallel stripes,...
Stas Rozenfeld, Ilan Shimshoni, Michael Lindenbaum
In STOC’05, Ahn, Hopper and Langford introduced the notion of covert computation. A covert computation protocol is one in which parties can run a protocol without knowing if oth...
We study stochastic models to mitigate the risk of poor Quality-of-Service (QoS) in computational markets. Consumers who purchase services expect both price and performance guaran...