Sciweavers

491 search results - page 83 / 99
» RETNA: From Requirements to Testing in a Natural Way
Sort
View
SIGSOFT
2005
ACM
14 years 8 months ago
Applying classification techniques to remotely-collected program execution data
There is an increasing interest in techniques that support measurement and analysis of fielded software systems. One of the main goals of these techniques is to better understand ...
Murali Haran, Alan F. Karr, Alessandro Orso, Adam ...
TABLETOP
2008
IEEE
14 years 1 months ago
Pokey: Interaction through covert structured light
In this paper we describe a method to support interaction with a cellphone based projectorcamera system. We describe a novel approach that uses a technique known in Computer Visio...
Christopher Richard Wren, Yuri A. Ivanov, Paul A. ...
PKC
2009
Springer
129views Cryptology» more  PKC 2009»
13 years 12 months ago
Zero-Knowledge Proofs with Witness Elimination
Abstract. Zero-knowledge proofs with witness elimination are protocols that enable a prover to demonstrate knowledge of a witness to the verifier that accepts the interaction prov...
Aggelos Kiayias, Hong-Sheng Zhou
KDD
1998
ACM
145views Data Mining» more  KDD 1998»
13 years 11 months ago
Aggregation of Imprecise and Uncertain Information for Knowledge Discovery in Databases
We consider the problem of aggregation for uncertain and imprecise data. For such data, we define aggregation operators and use them to provide information on properties and patte...
Sally I. McClean, Bryan W. Scotney, Mary Shapcott
EDBT
2009
ACM
145views Database» more  EDBT 2009»
13 years 11 months ago
Efficient top-k count queries over imprecise duplicates
We propose efficient techniques for processing various TopK count queries on data with noisy duplicates. Our method differs from existing work on duplicate elimination in two sign...
Sunita Sarawagi, Vinay S. Deshpande, Sourabh Kasli...