Sciweavers

2938 search results - page 17 / 588
» On obfuscating point functions
Sort
View
FCCM
2004
IEEE
109views VLSI» more  FCCM 2004»
13 years 11 months ago
Unifying Bit-Width Optimisation for Fixed-Point and Floating-Point Designs
This paper presents a method that offers a uniform treatment for bit-width optimisation of both fixed-point and floating-point designs. Our work utilises automatic differentiation...
Altaf Abdul Gaffar, Oskar Mencer, Wayne Luk, Peter...
EJC
2008
13 years 7 months ago
Enumeration of almost polynomial rational functions with given critical values
1 Rational functions and minimal factorizations of permutations Let f : C C be a rational function of degree n in one complex variable. A critical point of f is a point z C such...
Dmitri Panov, Dimitri Zvonkine
JGO
2008
73views more  JGO 2008»
13 years 7 months ago
On Nash-Cournot oligopolistic market equilibrium models with concave cost functions
We consider Nash
Le D. Muu, V. H. Nguyen, N. V. Quy
WWW
2009
ACM
14 years 8 months ago
Detecting image spam using local invariant features and pyramid match kernel
Image spam is a new obfuscating method which spammers invented to more effectively bypass conventional text based spam filters. In this paper, we extract local invariant features ...
Haiqiang Zuo, Weiming Hu, Ou Wu, Yunfei Chen, Guan...
FAST
2009
13 years 5 months ago
Application of Named Graphs Towards Custom Provenance Views
Provenance capture as applied to execution oriented and interactive workflows is designed to record minute detail needed to support a "modify and restart" paradigm as we...
Tara Gibson, Karen Schuchardt, Eric G. Stephan