Sciweavers

7930 search results - page 1546 / 1586
» Greedy in Approximation Algorithms
Sort
View
CCS
2007
ACM
14 years 5 months ago
Privacy preserving error resilient dna searching through oblivious automata
Human Desoxyribo-Nucleic Acid (DNA) sequences offer a wealth of information that reveal, among others, predisposition to various diseases and paternity relations. The breadth and...
Juan Ramón Troncoso-Pastoriza, Stefan Katze...
CLEAR
2007
Springer
208views Biometrics» more  CLEAR 2007»
14 years 5 months ago
Head Orientation Estimation Using Particle Filtering in Multiview Scenarios
Abstract. This paper presents a novel approach to the problem of determining head pose estimation and face 3D orientation of several people in low resolution sequences from multipl...
Cristian Canton-Ferrer, Josep R. Casas, Montse Par...
COCO
2007
Springer
85views Algorithms» more  COCO 2007»
14 years 5 months ago
Norms, XOR Lemmas, and Lower Bounds for GF(2) Polynomials and Multiparty Protocols
This paper presents a unified and simple treatment of basic questions concerning two computational models: multiparty communication complexity and GF(2) polynomials. The key is t...
Emanuele Viola, Avi Wigderson
EMSOFT
2007
Springer
14 years 5 months ago
Optimal task placement to improve cache performance
Most recent embedded systems use caches to improve their average performance. Current timing analyses are able to compute safe timing guarantees for these systems, if tasks are ru...
Gernot Gebhard, Sebastian Altmeyer
SSD
2007
Springer
146views Database» more  SSD 2007»
14 years 5 months ago
Blind Evaluation of Nearest Neighbor Queries Using Space Transformation to Preserve Location Privacy
In this paper we propose a fundamental approach to perform the class of Nearest Neighbor (NN) queries, the core class of queries used in many of the location-based services, withou...
Ali Khoshgozaran, Cyrus Shahabi
« Prev « First page 1546 / 1586 Last » Next »