Location-hidden services, as offered by anonymity systems such as Tor, allow servers to be operated under a pseudonym. As Tor is an overlay network, servers hosting hidden service...
Software developers often duplicate source code to replicate functionality. This practice can hinder the maintenance of a software project: bugs may arise when two identical code ...
We propose to shift the goal of recognition from naming
to describing. Doing so allows us not only to name familiar
objects, but also: to report unusual aspects of a familiar
ob...
Ali Farhadi, David A. Forsyth, Derek Hoiem, Ian En...
We describe a novel viewpoint-lighting ambiguity which we call the KGBR. This ambiguity assumes orthographic projection or an affine camera, and uses Lambertian reflectance functi...
To preserve client privacy in the data mining process, a variety of techniques based on random perturbation of individual data records have been proposed recently. In this paper, ...