Sciweavers

5675 search results - page 1126 / 1135
» Exploiting Chaos for Computation
Sort
View
ICDM
2010
IEEE
115views Data Mining» more  ICDM 2010»
13 years 8 months ago
Polishing the Right Apple: Anytime Classification Also Benefits Data Streams with Constant Arrival Times
Classification of items taken from data streams requires algorithms that operate in time sensitive and computationally constrained environments. Often, the available time for class...
Jin Shieh, Eamonn J. Keogh
ICIP
2010
IEEE
13 years 8 months ago
Motion-blur-free exposure fusion
We present a novel approach to HDR (high-dynamic-range) image fusion that copes with image blur degradation often present in longexposed images. The proposed approach can deal wit...
Marius Tico, Natasha Gelfand, Kari Pulli
ICTAI
2010
IEEE
13 years 8 months ago
The BioASP Library: ASP Solutions for Systems Biology
Abstract--Today's molecular biology is confronted with enormous amounts of data, generated by new high-throughput technologies, along with an increasing number of biological m...
Martin Gebser, Arne König, Torsten Schaub, Sv...
SAMOS
2010
Springer
13 years 8 months ago
OpenCL-based design methodology for application-specific processors
OpenCL is a programming language standard which enables the programmer to express the application by structuring its computation as kernels. The OpenCL compiler is given the explic...
Pekka O. Jaskelainen, Carlos S. de La Lama, Pablo ...
SP
2010
IEEE
190views Security Privacy» more  SP 2010»
13 years 8 months ago
Noninterference through Secure Multi-execution
A program is defined to be noninterferent if its outputs cannot be influenced by inputs at a higher security level than their own. Various researchers have demonstrated how this pr...
Dominique Devriese, Frank Piessens
« Prev « First page 1126 / 1135 Last » Next »