Sciweavers

1416 search results - page 136 / 284
» cost 2009
Sort
View
SIGMOD
2009
ACM
122views Database» more  SIGMOD 2009»
14 years 11 months ago
Finding min-repros in database software
Testing and debugging database system applications is often challenging and time consuming. A database tester (or DB tester for short) has to detect a problem, determine why it ha...
Nicolas Bruno, Rimma V. Nehme
IROS
2009
IEEE
199views Robotics» more  IROS 2009»
14 years 5 months ago
Multiswarm Particle Filter for vision based SLAM
Abstract— Particle Filters have been widely used as a powerful optimization tool for nonlinear, non-Gaussian dynamic models such as Simultaneous Localization and Mapping (SLAM) a...
Hee Seok Lee, Kyoung Mu Lee
CANS
2009
Springer
120views Cryptology» more  CANS 2009»
14 years 5 months ago
Improved Garbled Circuit Building Blocks and Applications to Auctions and Computing Minima
Abstract. We consider generic Garbled Circuit (GC)-based techniques for Secure Function Evaluation (SFE) in the semi-honest model. We describe efficient GC constructions for additi...
Vladimir Kolesnikov, Ahmad-Reza Sadeghi, Thomas Sc...
ISVC
2009
Springer
14 years 5 months ago
DRONE: A Flexible Framework for Distributed Rendering and Display
The available rendering performance on current computers increases constantly, primarily by employing parallel algorithms using the newest many-core hardware, as for example multi-...
Michael Repplinger, Alexander Löffler, Dmitri...
HICSS
2009
IEEE
117views Biometrics» more  HICSS 2009»
14 years 5 months ago
Information Security: User Precautions, Attacker Efforts, and Enforcement
We analyze the strategic interactions among endusers and between end-users and attackers in mass and targeted attacks. In mass attacks, precautions by endusers are strategic subst...
Ivan P. L. Png, Qiu-Hong Wang