Sciweavers

221 search results - page 13 / 45
» Special Issue on Robust Geometric Algorithms and their Imple...
Sort
View
ATAL
2006
Springer
15 years 7 months ago
Robust mechanisms for information elicitation
We study information elicitation mechanisms in which a principal agent attempts to elicit the private information of other agents using a carefully selected payment scheme based o...
Aviv Zohar, Jeffrey S. Rosenschein
ATS
2001
IEEE
126views Hardware» more  ATS 2001»
15 years 7 months ago
Design of an Optimal Test Access Architecture Using a Genetic Algorithm
Test access is a major problem for core-based systemon-chip (SOC) designs. Since cores in an SOC are not directly accessible via chip inputs and outputs, special access mechanisms...
Zahra Sadat Ebadi, André Ivanov
EWC
2006
61views more  EWC 2006»
15 years 4 months ago
Embarrassingly parallel mesh refinement by edge subdivision
We have previously proposed a new technique for the communication-free adaptive refinement of tetrahedral meshes that works for all configurations. Implementations of the scheme mu...
David C. Thompson, Philippe P. Pébay
CVPR
2007
IEEE
16 years 6 months ago
Flexible Object Models for Category-Level 3D Object Recognition
Today's category-level object recognition systems largely focus on fronto-parallel views of objects with characteristic texture patterns. To overcome these limitations, we pr...
Akash Kushal, Cordelia Schmid, Jean Ponce
POPL
2008
ACM
16 years 4 months ago
Cryptographically sound implementations for typed information-flow security
In language-based security, confidentiality and integrity policies conveniently specify the permitted flows of information between different parts of a program with diverse levels...
Cédric Fournet, Tamara Rezk