Sciweavers

1585 search results - page 146 / 317
» Automatically optimizing secure computation
Sort
View
IPPS
2005
IEEE
14 years 1 months ago
Automated Analysis of Memory Access Behavior
Abstract— We developed an automated environment to measure the memory access behavior of applications on high performance clusters. Code optimization for processor caches is cruc...
Michael Gerndt, Tianchao Li
GECCO
2005
Springer
127views Optimization» more  GECCO 2005»
14 years 1 months ago
Investigating the performance of module acquisition in cartesian genetic programming
Embedded Cartesian Genetic Programming (ECGP) is a form of the graph based Cartesian Genetic Programming (CGP) in which modules are automatically acquired and evolved. In this pap...
James Alfred Walker, Julian Francis Miller
ASPDAC
2005
ACM
92views Hardware» more  ASPDAC 2005»
13 years 10 months ago
Partitioning and placement for buildable QCA circuits
— Quantum-dot Cellular Automata (QCA) is a novel computing mechanism that can represent binary information based on spatial distribution of electron charge configuration in chem...
Ramprasad Ravichandran, Michael T. Niemier, Sung K...
ICPR
2010
IEEE
1103views Computer Vision» more  ICPR 2010»
14 years 3 months ago
Fast Logo Detection and Recognition in Document Images
The scientific significance of automatic logo detection and recognition is more and more growing because of the increasing requirements of intelligent document image analysis an...
Zhe Li, Matthias Schulte-Austum, Martin Neschen
CVPR
2005
IEEE
14 years 1 months ago
Speckle-Constrained Filtering of Ultrasound Images
Ultrasound images provide the clinician with noninvasive, low cost, and real-time images that can help them in diagnosis, plannnig and therapy. However, although the human eye is ...
Karl Krissian, Ron Kikinis, Carl-Fredrik Westin, K...