Sciweavers

1585 search results - page 72 / 317
» Automatically optimizing secure computation
Sort
View
ECCV
1998
Springer
14 years 9 months ago
Multi-Step Procedures for the Localization of 2D and 3D Point Landmarks and Automatic ROI Size Selection
In this contribution, we are concerned with the detection and re ned localization of 3D point landmarks. We propose multi-step di erential procedures for subvoxel localization of 3...
Sönke Frantz, Karl Rohr, H. Siegfried Stiehl
LCPC
2005
Springer
14 years 1 months ago
Automatic Measurement of Instruction Cache Capacity
There is growing interest in autonomic computing systems that can optimize their own behavior on different platforms without manual intervention. Examples of successful self-opti...
Kamen Yotov, Sandra Jackson, Tyler Steele, Keshav ...
GECCO
2008
Springer
196views Optimization» more  GECCO 2008»
13 years 9 months ago
ADANN: automatic design of artificial neural networks
In this work an improvement of an initial approach to design Artificial Neural Networks to forecast Time Series is tackled, and the automatic process to design Artificial Neural N...
Juan Peralta, Germán Gutiérrez, Arac...
TDSC
2011
13 years 2 months ago
Mechanism Design-Based Secure Leader Election Model for Intrusion Detection in MANET
—In this paper, we study leader election in the presence of selfish nodes for intrusion detection in mobile ad hoc networks (MANETs). To balance the resource consumption among a...
Noman Mohammed, Hadi Otrok, Lingyu Wang, Mourad De...
ISDA
2006
IEEE
14 years 1 months ago
Efficient Multiplier over Finite Field Represented in Type II Optimal Normal Basis
- Elliptic curve cryptography plays a crucial role in networking and information security area, and modular multiplication arithmetic over finite field is a necessary computation p...
Youbo Wang, Zhiguang Tian, Xinyan Bi, Zhendong Niu