Sciweavers

1585 search results - page 156 / 317
» Automatically optimizing secure computation
Sort
View
POPL
2006
ACM
14 years 8 months ago
Simplifying reductions
We present optimization techniques for high level equational programs that are generalizations of affine control loops (ACLs). Significant parts of the SpecFP and PerfectClub benc...
Gautam Gupta, Sanjay V. Rajopadhye
ECCV
2002
Springer
14 years 10 months ago
Real-Time Interactive Path Extraction with on-the-Fly Adaptation of the External Forces
The aim of this work is to propose an adaptation of optimal path based interactive tools for image segmentation (related to Live-Wire [12] and Intelligent Scissors [18] approaches)...
Olivier Gérard, Thomas Deschamps, Myriam Gr...
ICML
2005
IEEE
14 years 9 months ago
Expectation maximization algorithms for conditional likelihoods
We introduce an expectation maximizationtype (EM) algorithm for maximum likelihood optimization of conditional densities. It is applicable to hidden variable models where the dist...
Jarkko Salojärvi, Kai Puolamäki, Samuel ...
SAC
2010
ACM
14 years 3 months ago
A simple role mining algorithm
Complex organizations need to establish access control policies in order to manage access to restricted resources. Role Based Access Control paradigm has been introduced in ’90 ...
Carlo Blundo, Stelvio Cimato
HYBRID
2009
Springer
14 years 2 months ago
Decompositional Construction of Lyapunov Functions for Hybrid Systems
In this paper, we present an automatable decompositional method for the computation of Lyapunov functions for hybrid systems with complex discrete state spaces. We use graph-based ...
Jens Oehlerking, Oliver E. Theel