Sciweavers

1585 search results - page 174 / 317
» Automatically optimizing secure computation
Sort
View
CORR
2010
Springer
148views Education» more  CORR 2010»
13 years 8 months ago
Perturbation Resilience and Superiorization of Iterative Algorithms
Iterative algorithms aimed at solving some problems are discussed. For certain problems, such as finding a common point in the intersection of a finite number of convex sets, there...
Yair Censor, R. Davidi, Gabor T. Herman
DAC
2003
ACM
14 years 9 months ago
Test cost reduction for SOCs using virtual TAMs and lagrange multipliers
Recent advances in tester technology have led to automatic test equipment (ATE) that can operate at up to several hundred MHz. However, system-on-chip (SOC) scan chains typically ...
Anuja Sehgal, Vikram Iyengar, Mark D. Krasniewski,...
SACMAT
2011
ACM
12 years 11 months ago
An integrated approach for identity and access management in a SOA context
In this paper, we present an approach for identity and access management (IAM) in the context of (cross-organizational) serviceoriented architectures (SOA). In particular, we deļ¬...
Waldemar Hummer, Patrick Gaubatz, Mark Strembeck, ...
EUROGRAPHICS
2010
Eurographics
14 years 5 months ago
The Virtual Director: a Correlation-Based Online Viewing of Human Motion
Automatic camera control for scenes depicting human motion is an imperative topic in motion capture base animation, computer games, and other animation based ļ¬elds. This challen...
Jackie Assa, Lior Wolf, Daniel Cohen-Or
AAAI
2004
13 years 9 months ago
Methods for Boosting Revenue in Combinatorial Auctions
We study the recognized open problem of designing revenuemaximizing combinatorial auctions. It is unsolved even for two bidders and two items for sale. Rather than pursuing the pu...
Anton Likhodedov, Tuomas Sandholm