Sciweavers

1585 search results - page 170 / 317
» Automatically optimizing secure computation
Sort
View
PPOPP
2009
ACM
14 years 8 months ago
Compiler-assisted dynamic scheduling for effective parallelization of loop nests on multicore processors
Recent advances in polyhedral compilation technology have made it feasible to automatically transform affine sequential loop nests for tiled parallel execution on multi-core proce...
Muthu Manikandan Baskaran, Nagavijayalakshmi Vydya...
GRID
2004
Springer
14 years 1 months ago
From Sandbox to Playground: Dynamic Virtual Environments in the Grid
Much experience has been gained with the protocols and mechanisms needed for discovery and allocation of remote computational resources. However, the preparation of a remote compu...
Katarzyna Keahey, Karl Doering, Ian T. Foster
CSSE
2006
IEEE
13 years 8 months ago
Experimental analysis of a privacy-preserving scalar product protocol
The recent investigation of privacy-preserving data mining has been motivated by the growing concern about the privacy of individuals when their data is stored, aggregated, and mi...
Zhiqiang Yang, Rebecca N. Wright, Hiranmayee Subra...
DAC
2005
ACM
14 years 9 months ago
A new canonical form for fast boolean matching in logic synthesis and verification
? An efficient and compact canonical form is proposed for the Boolean matching problem under permutation and complementation of variables. In addition an efficient algorithm for co...
Afshin Abdollahi, Massoud Pedram
ACCV
2009
Springer
14 years 2 months ago
Levels of Details for Gaussian Mixture Models
Mixtures of Gaussians are a crucial statistical modeling tool at the heart of many challenging applications in computer vision and machine learning. In this paper, we first descri...
Vincent Garcia, Frank Nielsen, Richard Nock