Sciweavers

1585 search results - page 164 / 317
» Automatically optimizing secure computation
Sort
View
SI3D
1999
ACM
14 years 14 days ago
Preprocessing occlusion for real-time selective refinement
Visibility computation and level of detail modeling are two important components of efficient scenerendering algorithms. Both aim to lessen the graphics load by lowering polygon c...
Fei-Ah Law, Tiow Seng Tan
CCGRID
2002
IEEE
14 years 1 months ago
MS-I/O: A Distributed Multi-Storage I/O System
More and more parallel applications are running in a distributed environment to take advantage of easily available and inexpensive commodity resources. For data intensive applicat...
Xiaohui Shen, Alok N. Choudhary
ICCTA
2007
IEEE
14 years 1 days ago
Register Sharing Verification During Data-Path Synthesis
The variables of the high-level specifications and the automatically generated temporary variables are mapped on to the data-path registers during data-path synthesis phase of hig...
Chandan Karfa, Chittaranjan A. Mandal, Dipankar Sa...
WIOPT
2010
IEEE
13 years 6 months ago
Throughput-delay-reliability tradeoff in ad hoc networks
Abstract—Delay-reliability (D-R), and throughput-delayreliability (T-D-R) tradeoffs in an ad hoc network are derived for single hop and multi-hop transmission with automatic repe...
Rahul Vaze
CVPR
2011
IEEE
13 years 4 months ago
From Region Similarity to Category Discovery
The goal of object category discovery is to automatically identify groups of image regions which belong to some new, previously unseen category. This task is typically performed i...
Carolina Galleguillos, Brian McFee, Serge Belongie...