Sciweavers

1585 search results - page 152 / 317
» Automatically optimizing secure computation
Sort
View
ANCS
2005
ACM
14 years 1 months ago
High-throughput linked-pattern matching for intrusion detection systems
This paper presents a hardware architecture for highly efficient intrusion detection systems. In addition, a software tool for automatically generating the hardware is presented....
Zachary K. Baker, Viktor K. Prasanna
CEC
2005
IEEE
14 years 1 months ago
Evolutionary Solo Pong players
An Internet Java Applet http://www.cs.essex.ac.uk/staff/poli/ SoloPong/ allows users anywhere to play the Solo Pong game. We compare people’s performance to a hand coded “Optim...
William B. Langdon, Riccardo Poli
3DPVT
2006
IEEE
147views Visualization» more  3DPVT 2006»
14 years 2 months ago
Constraint Integration for Multiview Pose Estimation of Humans with Self-Occlusions
Detection of articulated objects such as humans is an important task in computer vision. We present a system that incorporates a variety of constraints in a unified multiview fra...
Abhinav Gupta, Anurag Mittal, Larry S. Davis
CGI
2000
IEEE
14 years 17 days ago
Neural Network-based Violinist's Hand Animation
We present a system for the animation of human hand that plays violin. Neural network controls the hand movement. We make use of an optimization method to generate the examples fo...
Junhwan Kim, Frederic Cordier, Nadia Magnenat-Thal...
USS
2010
13 years 6 months ago
SEPIA: Privacy-Preserving Aggregation of Multi-Domain Network Events and Statistics
Secure multiparty computation (MPC) allows joint privacy-preserving computations on data of multiple parties. Although MPC has been studied substantially, building solutions that ...
Martin Burkhart, Mario Strasser, Dilip Many, Xenof...