Sciweavers

384 search results - page 58 / 77
» Improving the Performance of a Tagger Generator in an Inform...
Sort
View
CCS
2010
ACM
13 years 7 months ago
TASTY: tool for automating secure two-party computations
Secure two-party computation allows two untrusting parties to jointly compute an arbitrary function on their respective private inputs while revealing no information beyond the ou...
Wilko Henecka, Stefan Kögl, Ahmad-Reza Sadegh...
SIGMOD
2012
ACM
212views Database» more  SIGMOD 2012»
11 years 9 months ago
Local structure and determinism in probabilistic databases
While extensive work has been done on evaluating queries over tuple-independent probabilistic databases, query evaluation over correlated data has received much less attention eve...
Theodoros Rekatsinas, Amol Deshpande, Lise Getoor
RSP
2005
IEEE
155views Control Systems» more  RSP 2005»
14 years 29 days ago
Optimization Techniques for ADL-Driven RTL Processor Synthesis
Nowadays, Architecture Description Languages (ADLs) are getting popular to speed up the development of complex SoC design, by performing the design space explon a higher level of ...
Oliver Schliebusch, Anupam Chattopadhyay, Ernst Ma...
ICARCV
2006
IEEE
313views Robotics» more  ICARCV 2006»
14 years 1 months ago
GestureCam: A Smart Camera for Gesture Recognition and Gesture-Controlled Web Navigation
– Smart camera, or an intelligent camera, is an embedded vision system which captures and processes image to extract application-specific information in real time. Smart cameras ...
Yu Shi, Ronnie Taib, Serge Lichman
CIKM
2010
Springer
13 years 2 months ago
Mining networks with shared items
Recent advances in data processing have enabled the generation of large and complex graphs. Many researchers have developed techniques to investigate informative structures within...
Jun Sese, Mio Seki, Mutsumi Fukuzaki