Sciweavers

1585 search results - page 47 / 317
» Automatically optimizing secure computation
Sort
View
EUROPAR
2001
Springer
14 years 10 days ago
A Software Architecture for User Transparent Parallel Image Processing on MIMD Computers
Abstract. This paper describes a software architecture that allows image processing researchers to develop parallel applications in a transparent manner. The architecture’s main ...
Frank J. Seinstra, Dennis Koelma, Jan-Mark Geusebr...
JOT
2006
80views more  JOT 2006»
13 years 7 months ago
Remote Job Submission Security
This paper presents the middleware needed to deploy jobs to non-geographically colocated clusters with decentralized look-up severs. We have named our framework the Initium Remote...
Pawel Krepsztul, Douglas A. Lyon
PPSN
2000
Springer
13 years 11 months ago
Towards Automatic Domain Knowledge Extraction for Evolutionary Heuristics
Domain knowledge is essential for successful problem solving and optimization. This paper introduces a framework in which a form of automatic domain knowledge extraction can be im...
Márk Jelasity
AMDO
2006
Springer
13 years 11 months ago
Automatic Pose Correction for Local Feature-Based Face Authentication
In this paper, we present an automatic face authentication system. Accurate segmentation of prominent facial features is accomplished by means of an extension of the Active Shape M...
Daniel González-Jiménez, Federico Su...
TMC
2011
164views more  TMC 2011»
13 years 2 months ago
Security Games for Vehicular Networks
—Vehicular networks (VANETs) can be used to improve transportation security, reliability, and management. This paper investigates security aspects of VANETs within a game-theoret...
Tansu Alpcan, Sonja Buchegger