Sciweavers

886 search results - page 82 / 178
» Generalized Bezout Identity
Sort
View
CCS
2006
ACM
14 years 28 days ago
Hot or not: revealing hidden services by their clock skew
Location-hidden services, as offered by anonymity systems such as Tor, allow servers to be operated under a pseudonym. As Tor is an overlay network, servers hosting hidden service...
Steven J. Murdoch
OOPSLA
2010
Springer
13 years 7 months ago
Scalable and systematic detection of buggy inconsistencies in source code
Software developers often duplicate source code to replicate functionality. This practice can hinder the maintenance of a software project: bugs may arise when two identical code ...
Mark Gabel, Junfeng Yang, Yuan Yu, Moisés G...
CVPR
2009
IEEE
1084views Computer Vision» more  CVPR 2009»
15 years 4 months ago
Describing Objects by their Attributes
We propose to shift the goal of recognition from naming to describing. Doing so allows us not only to name familiar objects, but also: to report unusual aspects of a familiar ob...
Ali Farhadi, David A. Forsyth, Derek Hoiem, Ian En...
ICCV
2001
IEEE
14 years 11 months ago
The KGBR Viewpoint-Lighting Ambiguity and its Resolution by Generic Constraints
We describe a novel viewpoint-lighting ambiguity which we call the KGBR. This ambiguity assumes orthographic projection or an affine camera, and uses Lambertian reflectance functi...
Alan L. Yuille, James M. Coughlan, Scott Konishi
ICDE
2005
IEEE
118views Database» more  ICDE 2005»
14 years 10 months ago
A Framework for High-Accuracy Privacy-Preserving Mining
To preserve client privacy in the data mining process, a variety of techniques based on random perturbation of individual data records have been proposed recently. In this paper, ...
Shipra Agrawal, Jayant R. Haritsa