Sciweavers

5086 search results - page 876 / 1018
» The Power of Comparative Reasoning
Sort
View
CRYPTO
2011
Springer
207views Cryptology» more  CRYPTO 2011»
14 years 3 months ago
Secure Computation on the Web: Computing without Simultaneous Interaction
Secure computation enables mutually suspicious parties to compute a joint function of their private inputs while providing strong security guarantees. Amongst other things, even i...
Shai Halevi, Yehuda Lindell, Benny Pinkas
TACAS
2012
Springer
277views Algorithms» more  TACAS 2012»
13 years 11 months ago
Proving Reachability Using FShell - (Competition Contribution)
FShell is an automated white-box test-input generator for C programs, computing test data with respect to user-specified code coverage criteria. The pillars of FShell are the decl...
Andreas Holzer, Daniel Kroening, Christian Schallh...
ICCV
2001
IEEE
16 years 5 months ago
Noise in Bilinear Problems
: Despite the wide application of bilinear problems to problems both in computer vision and in other fields, their behaviour under the effects of noise is still poorly understood. ...
John A. Haddon, David A. Forsyth
219
Voted
GIS
2009
ACM
16 years 4 months ago
Map-Matching for Low-Sampling-Rate GPS Trajectories
Map-matching is the process of aligning a sequence of observed user positions with the road network on a digital map. It is a fundamental pre-processing step for many applications...
Yin Lou, Chengyang Zhang, Yu Zheng, Xing Xie, Wei ...
215
Voted
GIS
2005
ACM
16 years 4 months ago
In-network surface simplification for sensor fields
Recent research literature on sensor network databases has focused on finding ways to perform in-network aggregation of sensor readings to reduce the message cost. However, with t...
Brian Harrington, Yan Huang