Sciweavers

1585 search results - page 206 / 317
» Automatically optimizing secure computation
Sort
View
PERCOM
2010
ACM
14 years 5 days ago
Negotiate power and performance in the reality of RFID systems
—Recent years have witnessed the wide adoption of the RFID technology in many important application domains including logistics, inventory, retailing, public transportation, and ...
Xunteng Xu, Lin Gu, Jianping Wang, Guoliang Xing
MOBISYS
2010
ACM
13 years 10 months ago
PRISM: platform for remote sensing using smartphones
To realize the potential of opportunistic and participatory sensing using mobile smartphones, a key challenge is ensuring the ease of developing and deploying such applications, w...
Tathagata Das, Prashanth Mohan, Venkata N. Padmana...
GECCO
2006
Springer
215views Optimization» more  GECCO 2006»
13 years 12 months ago
A multi-chromosome approach to standard and embedded cartesian genetic programming
Embedded Cartesian Genetic Programming (ECGP) is an extension of Cartesian Genetic Programming (CGP) that can automatically acquire, evolve and re-use partial solutions in the for...
James Alfred Walker, Julian Francis Miller, Rachel...
CVPR
2009
IEEE
15 years 3 months ago
Rank Priors for Continuous Non-Linear Dimensionality Reduction
Non-linear dimensionality reductionmethods are powerful techniques to deal with high-dimensional datasets. However, they often are susceptible to local minima and perform poorly ...
Andreas Geiger (Karlsruhe Institute of Technology)...
CVPR
2007
IEEE
14 years 10 months ago
An Exemplar Model for Learning Object Classes
We introduce an exemplar model that can learn and generate a region of interest around class instances in a training set, given only a set of images containing the visual class. T...
Ondrej Chum, Andrew Zisserman