Sciweavers

1644 search results - page 101 / 329
» Finding Dominators in Practice
Sort
View
MICCAI
2003
Springer
14 years 9 months ago
De-noising SPECT/PET Images Using Cross-Scale Regularization
De-noising of SPECT and PET images is a challenging task due to the inherent low signal-to-noise ratio of acquired data. Wavelet based multiscale denoising methods typically apply ...
Yinpeng Jin, Elsa D. Angelini, Peter D. Esser, And...
WWW
2003
ACM
14 years 9 months ago
Extrapolation methods for accelerating PageRank computations
We present a novel algorithm for the fast computation of PageRank, a hyperlink-based estimate of the "importance" of Web pages. The original PageRank algorithm uses the ...
Sepandar D. Kamvar, Taher H. Haveliwala, Christoph...
CHI
2003
ACM
14 years 9 months ago
Unpacking "privacy" for a networked world
Although privacy is broadly recognized as a dominant concern for the development of novel interactive technologies, our ability to reason analytically about privacy in real settin...
Leysia Palen, Paul Dourish
PERCOM
2007
ACM
14 years 8 months ago
Dynamic Key-Updating: Privacy-Preserving Authentication for RFID Systems
The objective of private authentication for Radio Frequency Identification (RFID) systems is to allow valid readers to explicitly authenticate their dominated tags without leaking...
Li Lu, Jinsong Han, Lei Hu, Yunhao Liu, Lionel M. ...
ISPD
2010
ACM
177views Hardware» more  ISPD 2010»
14 years 3 months ago
Skew management of NBTI impacted gated clock trees
NBTI (Negative Bias Temperature Instability) has emerged as the dominant failure mechanism for PMOS in nanometer IC designs. However, its impact on one of the most important compo...
Ashutosh Chakraborty, David Z. Pan