Sciweavers

1045 search results - page 162 / 209
» The Use of Exceptions
Sort
View
187
Voted
ECCV
2002
Springer
1127views Computer Vision» more  ECCV 2002»
16 years 4 months ago
Removing Shadows from Images
Illumination conditions cause problems for many computer vision algorithms. Inparticular, shadows in an image can cause segmentation, tracking, or recognition algorithms to fail. I...
Graham D. Finlayson, Steven D. Hordley, Mark S. Dr...
142
Voted
SCN
2010
Springer
187views Communications» more  SCN 2010»
15 years 1 months ago
Searching Keywords with Wildcards on Encrypted Data
Abstract. A hidden vector encryption scheme (HVE) is a derivation of identity-based encryption, where the public key is actually a vector over a certain alphabet. The decryption ke...
Saeed Sedghi, Peter van Liesdonk, Svetla Nikova, P...
154
Voted
SIGSOFT
2008
ACM
16 years 3 months ago
Randomized active atomicity violation detection in concurrent programs
Atomicity is an important specification that enables programmers to understand atomic blocks of code in a multi-threaded program as if they are sequential. This significantly simp...
Chang-Seo Park, Koushik Sen
117
Voted
HPCA
2009
IEEE
15 years 9 months ago
MRR: Enabling fully adaptive multicast routing for CMP interconnection networks
On-network hardware support for multi-destination traffic is a desirable feature in most multiprocessor machines. Multicast hardware capabilities enable much more effective bandwi...
Pablo Abad Fidalgo, Valentin Puente, José-&...
121
Voted
CGO
2008
IEEE
15 years 9 months ago
Fast liveness checking for ssa-form programs
Liveness analysis is an important analysis in optimizing compilers. Liveness information is used in several optimizations and is mandatory during the code-generation phase. Two dr...
Benoit Boissinot, Sebastian Hack, Daniel Grund, Be...