Sciweavers

1585 search results - page 228 / 317
» Automatically optimizing secure computation
Sort
View
ICCV
2003
IEEE
14 years 10 months ago
Feature Selection for Unsupervised and Supervised Inference: the Emergence of Sparsity in a Weighted-based Approach
The problem of selecting a subset of relevant features in a potentially overwhelming quantity of data is classic and found in many branches of science. Examples in computer vision...
Lior Wolf, Amnon Shashua
RAID
2009
Springer
14 years 2 months ago
Adaptive Anomaly Detection via Self-calibration and Dynamic Updating
The deployment and use of Anomaly Detection (AD) sensors often requires the intervention of a human expert to manually calibrate and optimize their performance. Depending on the si...
Gabriela F. Cretu-Ciocarlie, Angelos Stavrou, Mich...
EUROPAR
2010
Springer
13 years 7 months ago
A Language-Based Tuning Mechanism for Task and Pipeline Parallelism
Abstract. Current multicore computers differ in many hardware aspects. Tuning parallel applications is indispensable to achieve best performance on a particular hardware platform....
Frank Otto, Christoph A. Schaefer, Matthias Dempe,...
WACV
2008
IEEE
14 years 2 months ago
Iris Extraction Based on Intensity Gradient and Texture Difference
Biometrics has become more and more important in security applications. In comparison with many other biometric features, iris recognition has very high recognition accuracy. Succ...
Guodong Guo, Michael J. Jones
EUROCRYPT
2004
Springer
14 years 1 months ago
Practical Large-Scale Distributed Key Generation
Generating a distributed key, where a constant fraction of the players can reconstruct the key, is an essential component of many largescale distributed computing tasks such as ful...
John F. Canny, Stephen Sorkin