Sciweavers

2938 search results - page 19 / 588
» On obfuscating point functions
Sort
View
SIAMJO
2002
96views more  SIAMJO 2002»
13 years 7 months ago
A New Efficient Large-Update Primal-Dual Interior-Point Method Based on a Finite Barrier
We introduce a new barrier function which is not a barrier function in the usual sense: it has finite value at the boundary of the feasible region. Despite this, its iteration bou...
Y. Q. Bai, Mohamed El Ghami, Cees Roos
MOR
2006
95views more  MOR 2006»
13 years 7 months ago
An Efficient Interior-Point Method for Convex Multicriteria Optimization Problems
In multicriteria optimization, several objective functions, conflicting with each other, have to be minimized simultaneously. We propose a new efficient method for approximating t...
Jörg Fliege
CCS
2008
ACM
13 years 9 months ago
Ether: malware analysis via hardware virtualization extensions
Malware has become the centerpiece of most security threats on the Internet. Malware analysis is an essential technology that extracts the runtime behavior of malware, and supplie...
Artem Dinaburg, Paul Royal, Monirul I. Sharif, Wen...
DCG
2007
77views more  DCG 2007»
13 years 7 months ago
Stability of Critical Points with Interval Persistence
Scalar functions defined on a topological space Ω are at the core of many applications such as shape matching, visualization and physical simulations. Topological persistence i...
Tamal K. Dey, Rephael Wenger
ICML
2008
IEEE
14 years 8 months ago
Fast Gaussian process methods for point process intensity estimation
Point processes are difficult to analyze because they provide only a sparse and noisy observation of the intensity function driving the process. Gaussian Processes offer an attrac...
John P. Cunningham, Krishna V. Shenoy, Maneesh Sah...