Sciweavers

181 search results - page 17 / 37
» Binary Change Set Composition
Sort
View
ASIACRYPT
2011
Springer
12 years 7 months ago
Noiseless Database Privacy
Differential Privacy (DP) has emerged as a formal, flexible framework for privacy protection, with a guarantee that is agnostic to auxiliary information and that admits simple ru...
Raghav Bhaskar, Abhishek Bhowmick, Vipul Goyal, Sr...
ISCA
2008
IEEE
205views Hardware» more  ISCA 2008»
14 years 1 months ago
VEAL: Virtualized Execution Accelerator for Loops
Performance improvement solely through transistor scaling is becoming more and more difficult, thus it is increasingly common to see domain specific accelerators used in conjunc...
Nathan Clark, Amir Hormati, Scott A. Mahlke
EMMCVPR
2001
Springer
14 years 1 days ago
Averaged Template Matching Equations
By exploiting an analogy with averaging procedures in fluid dynamics, we present a set of averaged template matching equations. These equations are analogs of the exact template m...
Anil N. Hirani, Jerrold E. Marsden, James Arvo
EUSFLAT
2009
181views Fuzzy Logic» more  EUSFLAT 2009»
13 years 5 months ago
Fuzzy Concept Lattice is Made by Proto-Fuzzy Concepts
Abstract-- An L-fuzzy context is a triple consisting of a set of objects, a set of attributes and an L-fuzzy binary relation between them. An l-cut is a classical context over the ...
Ondrej Kridlo, Stanislav Krajci
ICEIS
2003
IEEE
14 years 25 days ago
Incremental Horizontal Fragmentation of Database Class Objects
: Horizontal fragments of a class in an object-oriented database system contain subsets of the class extent or instance objects. These fragments are created with a set of system in...
Christie I. Ezeife, Pinakpani Dey