Sciweavers

6770 search results - page 174 / 1354
» How GPUs Work
Sort
View
SAC
2006
ACM
15 years 8 months ago
On the use of spectral filtering for privacy preserving data mining
Randomization has been a primary tool to hide sensitive private information during privacy preserving data mining.The previous work based on spectral filtering, show the noise ma...
Songtao Guo, Xintao Wu
VALUETOOLS
2006
ACM
15 years 8 months ago
Splitting with weight windows to control the likelihood ratio in importance sampling
Importance sampling (IS) is the most widely used efficiency improvement method for rare-event simulation. When estimating the probability of a rare event, the IS estimator is the ...
Pierre L'Ecuyer, Bruno Tuffin
FPT
2005
IEEE
163views Hardware» more  FPT 2005»
15 years 8 months ago
Designing an FPGA SoC Using a Standardized IP Block Interface
Designing Systems on-Chip is becoming increasingly popular as die sizes increase and technology sizes decrease. The complexity of integrating different types of Processing Element...
Lesley Shannon, Blair Fort, Samir Parikh, Arun Pat...
ICRA
2005
IEEE
225views Robotics» more  ICRA 2005»
15 years 8 months ago
Voronoi Toolpaths for PCB Mechanical Etch: Simple and Intuitive Algorithms with the 3D GPU
— We describe VIsolate (Voronoi Isolate), a system which performs geometric computations associated with toolpath planning for mechanical etch (also called isolation routing) of ...
Marsette Vona, Daniela Rus
ITCC
2005
IEEE
15 years 8 months ago
Formalisation and implementation of Access control models
Access control software must be based on a security policy model. Flaws in them may come from a lack of precision or some incoherences in the policy model or from inconsistencies ...
Mathieu Jaume, Charles Morisset