Sciweavers

1585 search results - page 56 / 317
» Automatically optimizing secure computation
Sort
View
ACL
2009
13 years 5 months ago
Automatically Generating Wikipedia Articles: A Structure-Aware Approach
In this paper, we investigate an approach for creating a comprehensive textual overview of a subject composed of information drawn from the Internet. We use the high-level structu...
Christina Sauper, Regina Barzilay
DAC
2006
ACM
14 years 8 months ago
Optimal simultaneous mapping and clustering for FPGA delay optimization
Both technology mapping and circuit clustering have a large impact on FPGA designs in terms of circuit performance, area, and power dissipation. Existing FPGA design flows carry o...
Joey Y. Lin, Deming Chen, Jason Cong
CCS
2009
ACM
14 years 2 months ago
Inferring privacy policies for social networking services
Social networking sites have come under criticism for their poor privacy protection track record. Yet, there is an inherent difficulty in deciding which principals should have acc...
George Danezis
SAC
2008
ACM
13 years 7 months ago
The tale of the weather worm
How humans behave when faced with a disaster, natural or man-made, can be exploited automatically by news-aware malicious software. We introduce weather worms, worms that can auto...
Joe Szabo, John Aycock, Randal Acton, Jörg De...
SAC
2003
ACM
14 years 1 months ago
Automatic Code Generation for a Convection Scheme
Traditional design and implementation of large atmospheric models is a difficult, tedious and error prone task. With the CTADEL project we investigate a new method of code genera...
Paul van der Mark, Lex Wolters, Gerard Cats