Sciweavers

1585 search results - page 17 / 317
» Automatically optimizing secure computation
Sort
View
ICPR
2000
IEEE
14 years 8 months ago
Automatic Training of Page Segmentation Algorithms: An Optimization Approach
Most page segmentation algorithms have userspecifiable free parameters. However, algorithm designers typically do not provide a quantitative/rigorous method for choosing values fo...
Song Mao, Tapas Kanungo
SC
2004
ACM
14 years 1 months ago
Rating Compiler Optimizations for Automatic Performance Tuning
To achieve maximum performance gains through compiler optimization, most automatic performance tuning systems use a feed-back directed approach to rate the code versions generated...
Zhelong Pan, Rudolf Eigenmann
CCS
2009
ACM
14 years 2 months ago
Computational soundness for key exchange protocols with symmetric encryption
Formal analysis of security protocols based on symbolic models has been very successful in finding flaws in published protocols and proving protocols secure, using automated too...
Ralf Küsters, Max Tuengerthal
ARITH
2009
IEEE
14 years 2 months ago
Challenges in Automatic Optimization of Arithmetic Circuits
Despite the impressive progress of logic synthesis in the past decade, finding the best architecture for a given circuit still remains an open and largely unsolved problem, espec...
Ajay K. Verma, Philip Brisk, Paolo Ienne
ICDM
2005
IEEE
165views Data Mining» more  ICDM 2005»
14 years 1 months ago
Optimizing Constraint-Based Mining by Automatically Relaxing Constraints
In constraint-based mining, the monotone and antimonotone properties are exploited to reduce the search space. Even if a constraint has not such suitable properties, existing algo...
Arnaud Soulet, Bruno Crémilleux