Sciweavers

2016 search results - page 390 / 404
» Megamaps: Construction and Examples
Sort
View
SACMAT
2009
ACM
14 years 1 months ago
xDomain: cross-border proofs of access
A number of research systems have demonstrated the benefits of accompanying each request with a machine-checkable proof that the request complies with access-control policy — a...
Lujo Bauer, Limin Jia, Michael K. Reiter, David Sw...
CGO
2008
IEEE
14 years 1 months ago
Prediction and trace compression of data access addresses through nested loop recognition
This paper describes an algorithm that takes a trace (i.e., a sequence of numbers or vectors of numbers) as input, and from that produces a sequence of loop nests that, when run, ...
Alain Ketterlin, Philippe Clauss
ICASSP
2008
IEEE
14 years 1 months ago
An information theoretic approach to processing management
In region surveillance applications, sensors oftentimes accumulate an overwhelmingly large amount of data, making it infeasible to process all of the collected data in real-time. ...
Christopher M. Kreucher, Kevin M. Carter
ICDCS
2008
IEEE
14 years 1 months ago
Measurement Manipulation and Space Selection in Network Coordinates
Internet coordinate systems have emerged as an efficient method to estimate the latency between pairs of nodes without any communication between them. However, most coordinate sy...
Cristian Lumezanu, Neil Spring
CVPR
2007
IEEE
14 years 1 months ago
Shape Variation-Based Frieze Pattern for Robust Gait Recognition
Gait is an attractive biometric for vision-based human identification. Previous work on existing public data sets has shown that shape cues yield improved recognition rates compar...
Seungkyu Lee, Yanxi Liu, Robert T. Collins