Sciweavers

523 search results - page 65 / 105
» codes 2011
Sort
View
132
Voted
ICCV
2011
IEEE
14 years 2 months ago
Refractive Shape from Light Field Distortion
Acquiring transparent, refractive objects is challenging as these kinds of objects can only be observed by analyzing the distortion of reference background patterns. We present a ...
Gordon Wetzstein, David Roodnick, Wolfgang Heidric...
139
Voted
CCS
2011
ACM
14 years 2 months ago
VMCrypt: modular software architecture for scalable secure computation
Garbled circuits play a key role in secure computation. Unlike previous work, which focused mainly on efficiency and automation aspects of secure computation, in this paper we foc...
Lior Malka
160
Voted
ICST
2011
IEEE
14 years 6 months ago
Constraint-Based Program Debugging Using Data Structure Repair
—Developers have used data structure repair over the last few decades as an effective means to recover on-the-fly from errors in program state. Traditional repair techniques wer...
Muhammad Zubair Malik, Junaid Haroon Siddiqui, Sar...
110
Voted
CORR
2011
Springer
200views Education» more  CORR 2011»
14 years 9 months ago
Beating the Gilbert-Varshamov Bound for Online Channels
In the online channel coding model, a sender wishes to communicate a message to a receiver by transmitting a codeword x = (x1, . . . , xn) ∈ {0, 1}n bit by bit via a channel lim...
Ishay Haviv, Michael Langberg
CORR
2011
Springer
259views Education» more  CORR 2011»
14 years 9 months ago
Automatic Optimization for MapReduce Programs
The MapReduce distributed programming framework has become popular, despite evidence that current implementations are inefficient, requiring far more hardware than a traditional r...
Eaman Jahani, Michael J. Cafarella, Christopher R&...