Sciweavers

66 search results - page 9 / 14
» Using Proximity Search to Estimate Authority Flow
Sort
View
ICFP
2010
ACM
13 years 9 months ago
Security-typed programming within dependently typed programming
Several recent security-typed programming languages, such as Aura, PCML5, and Fine, allow programmers to express and enforce access control and information flow policies. Most of ...
Jamie Morgenstern, Daniel R. Licata
SIGMETRICS
2008
ACM
142views Hardware» more  SIGMETRICS 2008»
13 years 8 months ago
Exploiting manufacturing variations for compensating environment-induced clock drift in time synchronization
Time synchronization is an essential service in distributed computing and control systems. It is used to enable tasks such as synchronized data sampling and accurate time-offlight...
Thomas Schmid, Zainul Charbiwala, Jonathan Friedma...
WWW
2005
ACM
14 years 9 months ago
Sampling search-engine results
We consider the problem of efficiently sampling Web search engine query results. In turn, using a small random sample instead of the full set of results leads to efficient approxi...
Aris Anagnostopoulos, Andrei Z. Broder, David Carm...
TRECVID
2008
13 years 10 months ago
Surveillance Event Detection
We have developed and evaluated three generalized systems for event detection. The first system is a simple brute force search method, where each space-time location in the video ...
Mert Dikmen, Huazhong Ning, Dennis J. Lin, Liangli...
PAMI
2006
126views more  PAMI 2006»
13 years 8 months ago
Rotation Recovery from Spherical Images without Correspondences
This paper addresses the problem of rotation estimation directly from images defined on the sphere and without correspondence. The method is particularly useful for the alignment ...
Ameesh Makadia, Kostas Daniilidis