• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 251,127
Next 10 →

Microsoft Research,

by Meredith Ringel Morris, Jacob O. Wobbrock, Andrew D. Wilson
"... We compare two gesture sets for interactive surfaces—a set of gestures created by an end-user elicitation method and a set of gestures authored by three HCI researchers. Twenty-two participants who were blind to the gestures ’ authorship evaluated 81 gestures presented and performed on a Microsoft S ..."
Abstract - Cited by 5 (0 self) - Add to MetaCart
We compare two gesture sets for interactive surfaces—a set of gestures created by an end-user elicitation method and a set of gestures authored by three HCI researchers. Twenty-two participants who were blind to the gestures ’ authorship evaluated 81 gestures presented and performed on a Microsoft

Microsoft Research

by Todd A. Proebsting, Gregg M. Townsend, Todd A. Proebsting, Gregg M. Townsend , 1999
"... We describe Jcon, a new, Java-based implementation of the Icon programming language. The imple-mentation includes a compiler and runtime system. The runtime system is novel in its concise and efficient object-oriented implementation of a dynamically typed language, as well as its simple mechanism fo ..."
Abstract - Cited by 1 (0 self) - Add to MetaCart
We describe Jcon, a new, Java-based implementation of the Icon programming language. The imple-mentation includes a compiler and runtime system. The runtime system is novel in its concise and efficient object-oriented implementation of a dynamically typed language, as well as its simple mechanism for real-izing Icon generators. 1

Microsoft Research§

by Takaaki Shiratori, Yasuyuki Matsushita, Sing Bing, Kang Xiaoou Tang, Wa U. S. A
"... Existing methods for video completion typically rely on periodic color transitions, layer extraction, or temporally local motion. However, periodicity may be imperceptible or absent, layer extraction is difficult, and temporally lo-cal motion cannot handle large holes. This paper presents a new appr ..."
Abstract - Add to MetaCart
Existing methods for video completion typically rely on periodic color transitions, layer extraction, or temporally local motion. However, periodicity may be imperceptible or absent, layer extraction is difficult, and temporally lo-cal motion cannot handle large holes. This paper presents a new approach for video completion using motion field transfer to avoid such problems. Unlike prior methods, we fill in missing video parts by sampling spatio-temporal patches of local motion instead of directly sampling color. Once the local motion field has been computed within the missing parts of the video, color can then be propagated to produce a seamless hole-free video. We have validated our method on many videos spanning a variety of scenes. We can also use the same approach to perform frame interpo-lation using motion fields from different videos. 1.

Microsoft Research

by Craig Costello, Jon Howell, Markulf Kohlweiss, Benjamin Kreuter, Michael Naehrig, Samee Zahur , 2014
"... Cloud computing sparked interest in Verifiable Computation protocols, which allow a weak client to securely outsource com-putations to remote parties. Recent work has dramatically re-duced the client’s cost to verify the correctness of results, but the overhead to produce proofs largely remains impr ..."
Abstract - Add to MetaCart
Cloud computing sparked interest in Verifiable Computation protocols, which allow a weak client to securely outsource com-putations to remote parties. Recent work has dramatically re-duced the client’s cost to verify the correctness of results, but the overhead to produce proofs largely remains impractical. Geppetto introduces complementary techniques for reducing prover overhead and increasing prover flexibility. With Multi-QAPs, Geppetto reduces the cost of sharing state between com-putations (e.g., for MapReduce) or within a single computa-tion by up to two orders of magnitude. Via a careful instantia-tion of cryptographic primitives, Geppetto also brings down the cost of verifying outsourced cryptographic computations (e.g., verifiably computing on signed data); together with Geppetto’s notion of bounded proof bootstrapping, Geppetto improves on prior bootstrapped systems by five orders of magnitude, albeit at some cost in universality. Geppetto also supports qualitatively new properties like verifying the correct execution of propri-etary (i.e., secret) algorithms. Finally, Geppetto’s use of energy-saving circuits brings the prover’s costs more in line with the program’s actual (rather than worst-case) execution time. Geppetto is implemented in a full-fledged, scalable compiler that consumes LLVM code generated from a variety of apps, as well as a large cryptographic library. 1

Microsoft Research,

by Saswat An, Patrice Godefroid, Nikolai Tillmann
"... Abstract. We discuss how to perform symbolic execution of large programs in a manner that is both compositional (hence more scalable) and demand-driven. Compositional symbolic execution means finding feasible interprocedural program paths by composing symbolic executions of feasible intraprocedural ..."
Abstract - Add to MetaCart
Abstract. We discuss how to perform symbolic execution of large programs in a manner that is both compositional (hence more scalable) and demand-driven. Compositional symbolic execution means finding feasible interprocedural program paths by composing symbolic executions of feasible intraprocedural paths. By demand-driven, we mean that as few intraprocedural paths as possible are symbolically executed in order to form an interprocedural path leading to a specific target branch or statement of interest (like an assertion). A key originality of this work is that our demand-driven compositional interprocedural symbolic execution is performed entirely using first-order logic formulas solved with an off-the-shelf SMT (Satisfiability-Modulo-Theories) solver – no procedure in-lining or custom algorithm is required for the interprocedural part. This allows a uniform and elegant way of summarizing procedures at various levels of detail and of composing those using logic formulas. We have implemented a prototype of this novel symbolic execution technique as an extension of Pex, a general automatic testing framework for.NET applications. Preliminary experimental results are encouraging. For instance, our prototype was able to generate tests triggering assertion violations in programs with large numbers of program paths that were beyond the scope of non-compositional test generation. 1

Microsoft Research,

by Jiahong Yuan, Neville Ryant, Mark Liberman, Andreas Stolcke, Vikramjit Mitra, Wen Wang
"... SRI International This study attempts to improve automatic phonetic segmentation within the HMM framework. Experiments were conducted to investigate the use of phone boundary models, the use of precise phonetic segmentation for training HMMs, and the difference between context-dependent and contexti ..."
Abstract - Add to MetaCart
SRI International This study attempts to improve automatic phonetic segmentation within the HMM framework. Experiments were conducted to investigate the use of phone boundary models, the use of precise phonetic segmentation for training HMMs, and the difference between context-dependent and contextindependent phone models in terms of forced alignment performance. Results show that the combination of special one-state phone boundary models and monophone HMMs can significantly improve forced alignment accuracy. HMM-based forced alignment systems can also benefit from using precise phonetic segmentation for training HMMs. Context-dependent phone models are not better than context-independent models when combined with phone boundary models. The proposed system achieves 93.92 % agreement (of phone boundaries) within 20 ms compared to manual segmentation on the TIMIT corpus. This is the best reported result on TIMIT to our knowledge. Index Terms: phonetic segmentation, phone boundary model, forced alignment, HMM

Microsoft Research*

by Song Xue, Paul Luo Li, Joseph P. Mullally, Mingtian Ni, Greg Nichols, Solom Heddaya, Brendan Murphy
"... The traditional approach for predicting post-release software reliability is to emulate customer usage environments and scenarios during in-house testing. However, this approach has limitations for mass-market software systems (MMSS), such as the Windows operating system, because it is impractical t ..."
Abstract - Add to MetaCart
The traditional approach for predicting post-release software reliability is to emulate customer usage environments and scenarios during in-house testing. However, this approach has limitations for mass-market software systems (MMSS), such as the Windows operating system, because it is impractical to emulate the usage environments and scenarios of millions of users. This paper presents and validates Usage Profile-based Reliability Measurement Calibration (UPRMC), a novel approach for producing accurate post-release reliability predictions using data from beta releases. This work leverages usage and reliability data from multiple releases of a large commercial operating system spanning more than 3 years and more than 3 million users. Results show that UPRMC produces accurate and credible predictions; it has been adopted by the Windows organization. Categories and Subject Descriptors

Microsoft Research

by Edmund B. Nightingale, Daniel Peek, Peter M. Chen, Jason Flinn
"... Speck1 is a system that accelerates powerful security checks on commodity hardware by executing them in parallel on multiple cores. Speck provides an infrastructure that allows sequential in-vocations of a particular security check to run in parallel without sacricing the safety of the system. Speck ..."
Abstract - Add to MetaCart
Speck1 is a system that accelerates powerful security checks on commodity hardware by executing them in parallel on multiple cores. Speck provides an infrastructure that allows sequential in-vocations of a particular security check to run in parallel without sacricing the safety of the system. Speck creates parallelism in two ways. First, Speck decouples a security check from an appli-cation by continuing the application, using speculative execution, while the security check executes in parallel on another core. Sec-ond, Speck creates parallelism between sequential invocations of a security check by running later checks in parallel with earlier ones. Speck provides a process-level replay system to deterministically and efciently synchronize state between a security check and the original process. We use Speck to parallelize three security checks: sensitive data analysis, on-access virus scanning, and taint propaga-tion. Running on a 4-core and an 8-core computer, Speck improves performance 4x and 7.5x for the sensitive data analysis check, 3.3x and 2.8x for the on-access virus scanning check, and 1.6x and 2x for the taint propagation check.

Microsoft Research

by Jim Gray, Early Data Management
"... systems automated traditional information processing. Today they allow fast, reliable, and secure ally distributed data. Tomorrow’s systems will access and summarize richer forms of data. Multimedia databases will be a cornerstone of cyberspace. Computer omputers can now store all forms of informati ..."
Abstract - Add to MetaCart
systems automated traditional information processing. Today they allow fast, reliable, and secure ally distributed data. Tomorrow’s systems will access and summarize richer forms of data. Multimedia databases will be a cornerstone of cyberspace. Computer omputers can now store all forms of information: records, docu-ments, images, sound recordings, videos, scientific data, and many new data formats. Society has made great strides in capturing, storing, managing, analyzing, and visualizing this data. These tasks are

Microsoft Research,

by George Danezis, Ian Goldberg
"... Sphinx is a cryptographic message format used to relay anonymized messages within a mix network. It is more compact than any comparable scheme, and supports a full set of security features: indistinguishable replies, hiding the path length and relay position, as well as providing unlinkability for e ..."
Abstract - Add to MetaCart
Sphinx is a cryptographic message format used to relay anonymized messages within a mix network. It is more compact than any comparable scheme, and supports a full set of security features: indistinguishable replies, hiding the path length and relay position, as well as providing unlinkability for each leg of the message’s journey over the network. We prove the full cryptographic security of Sphinx in the random oracle model, and we describe how it can be used as an efficient drop-in replacement in deployed remailer systems. 1.
Next 10 →
Results 1 - 10 of 251,127
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University