Sciweavers

1585 search results - page 82 / 317
» Automatically optimizing secure computation
Sort
View
ASAP
2003
IEEE
141views Hardware» more  ASAP 2003»
14 years 1 months ago
Automatic Instruction Set Extension and Utilization for Embedded Processors
There is a growing demand for application-specific embedded processors in system-on-a-chip designs. Current tools and design methodologies often require designers to manually spec...
Armita Peymandoust, Laura Pozzi, Paolo Ienne, Giov...
GI
2007
Springer
14 years 2 months ago
Multisensor Based Generation of Templates for Object Tracking in Complex Scenarios
Abstract: Protection and surveillance of persons and facilities is frequently associated with automatic tracking of striking objects like vehicles or persons in an image sequence. ...
Carmen Witte, Klaus Jäger, Walter Armbruster,...
DAC
2008
ACM
14 years 9 months ago
Automatic synthesis of clock gating logic with controlled netlist perturbation
Clock gating is the insertion of combinational logic along the clock path to prevent the unnecessary switching of registers and reduce dynamic power consumption. The conditions un...
Aaron P. Hurst
PPSN
2010
Springer
13 years 6 months ago
Privacy-Preserving Multi-Objective Evolutionary Algorithms
Existing privacy-preserving evolutionary algorithms are limited to specific problems securing only cost function evaluation. This lack of functionality and security prevents thei...
Daniel Funke, Florian Kerschbaum
MOBISYS
2007
ACM
14 years 7 months ago
Algorithm to automatically detect abnormally long periods of inactivity in a home
An algorithm has been developed to automatically construct individual models of normal activity within a home using motion sensor data. Alerts can be generated when a period of in...
Paul Cuddihy, Jenny Weisenberg, Catherine Graichen...