Sciweavers

99 search results - page 11 / 20
» A tale of four kernels
Sort
View
CPAIOR
2009
Springer
14 years 1 months ago
Six Ways of Integrating Symmetries within Non-overlapping Constraints
Abstract: This paper introduces six ways for handling a chain of lexicographic ordering constraint between the origins of identical orthotopes (e.g., rectangles, boxes, hyper-recta...
Magnus Ågren, Nicolas Beldiceanu, Mats Carls...
ICPPW
2006
IEEE
14 years 1 months ago
Multiple Flows of Control in Migratable Parallel Programs
Many important parallel applications require multiple flows of control to run on a single processor. In this paper, we present a study of four flow-of-control mechanisms: proces...
Gengbin Zheng, Laxmikant V. Kalé, Orion Sky...
MVA
2007
110views Computer Vision» more  MVA 2007»
13 years 8 months ago
Improving Accuracy of 3-D Reconstruction by Classifying Correspondences
In this paper, we show that we can improve accuracies of 3-D reconstructions with uncalibrated stereo by classifying correspondences between two images. After obtaining initial co...
Yusuke Takanashi, Yohei Shibata, Yasushi Kanazawa
JCST
2000
89views more  JCST 2000»
13 years 6 months ago
LinuxDirector: A Connection Director for Scalable Internet Services
LinuxDirector is a connection director that supports load balancing among multiple Internet servers, which can be used to build scalable Internet services based on clusters of ser...
Zhang Wensong, Shiyao Jin, Quanyuan Wu
SDM
2008
SIAM
135views Data Mining» more  SDM 2008»
13 years 8 months ago
Preemptive Measures against Malicious Party in Privacy-Preserving Data Mining
Currently, many privacy-preserving data mining (PPDM) algorithms assume the semi-honest model and/or malicious model of multi-party interaction. However, both models are far from ...
Shuguo Han, Wee Keong Ng