Sciweavers

1416 search results - page 136 / 284
» cost 2009
Sort
View
SIGMOD
2009
ACM
122views Database» more  SIGMOD 2009»
16 years 5 months ago
Finding min-repros in database software
Testing and debugging database system applications is often challenging and time consuming. A database tester (or DB tester for short) has to detect a problem, determine why it ha...
Nicolas Bruno, Rimma V. Nehme
IROS
2009
IEEE
199views Robotics» more  IROS 2009»
15 years 11 months ago
Multiswarm Particle Filter for vision based SLAM
Abstract— Particle Filters have been widely used as a powerful optimization tool for nonlinear, non-Gaussian dynamic models such as Simultaneous Localization and Mapping (SLAM) a...
Hee Seok Lee, Kyoung Mu Lee
CANS
2009
Springer
120views Cryptology» more  CANS 2009»
15 years 11 months ago
Improved Garbled Circuit Building Blocks and Applications to Auctions and Computing Minima
Abstract. We consider generic Garbled Circuit (GC)-based techniques for Secure Function Evaluation (SFE) in the semi-honest model. We describe efficient GC constructions for additi...
Vladimir Kolesnikov, Ahmad-Reza Sadeghi, Thomas Sc...
ISVC
2009
Springer
15 years 11 months ago
DRONE: A Flexible Framework for Distributed Rendering and Display
The available rendering performance on current computers increases constantly, primarily by employing parallel algorithms using the newest many-core hardware, as for example multi-...
Michael Repplinger, Alexander Löffler, Dmitri...
HICSS
2009
IEEE
117views Biometrics» more  HICSS 2009»
15 years 11 months ago
Information Security: User Precautions, Attacker Efforts, and Enforcement
We analyze the strategic interactions among endusers and between end-users and attackers in mass and targeted attacks. In mass attacks, precautions by endusers are strategic subst...
Ivan P. L. Png, Qiu-Hong Wang