Sciweavers

1585 search results - page 127 / 317
» Automatically optimizing secure computation
Sort
View
CCECE
2006
IEEE
14 years 2 months ago
Breast Cancer Prognosis via Gaussian Mixture Regression
This paper compares the performance of classification and regression trees (CART), multivariate adaptive regression splines (MARS), and a Gaussian mixture regressor (GMR) method ...
Tiago H. Falk, Hagit Shatkay, Wai-Yip Chan
GD
2005
Springer
14 years 1 months ago
Incremental Connector Routing
Most diagram editors and graph construction tools provide some form of automatic connector routing, typically providing orthogonal or poly-line connectors. Usually the editor provi...
Michael Wybrow, Kim Marriott, Peter J. Stuckey
OOPSLA
2009
Springer
14 years 2 months ago
Coherent reaction
Side effects are both the essence and bane of imperative programming. The programmer must carefully coordinate actions to manage their side effects upon each other. Such coordinat...
Jonathan Edwards
PLDI
2003
ACM
14 years 1 months ago
A provably sound TAL for back-end optimization
Typed assembly languages provide a way to generate machinecheckable safety proofs for machine-language programs. But the soundness proofs of most existing typed assembly languages...
Juan Chen, Dinghao Wu, Andrew W. Appel, Hai Fang
JUCS
2010
124views more  JUCS 2010»
13 years 6 months ago
Performance Optimizations for DAA Signatures on Java enabled Platforms
: With the spreading of embedded and mobile devices, public-key cryptography has become an important feature for securing communication and protecting personal data. However, the c...
Kurt Dietrich, Franz Röck