Sciweavers

1005 search results - page 137 / 201
» Practical Secure Function Evaluation
Sort
View
CAV
2009
Springer
176views Hardware» more  CAV 2009»
14 years 11 months ago
PAT: Towards Flexible Verification under Fairness
Recent development on distributed systems has shown that a variety of fairness constraints (some of which are only recently defined) play vital roles in designing self-stabilizing ...
Jun Sun 0001, Yang Liu 0003, Jin Song Dong, Jun Pa...
CVPR
2010
IEEE
1171views Computer Vision» more  CVPR 2010»
14 years 7 months ago
Geodesic Star Convexity for Interactive Image Segmentation
In this paper we introduce a new shape constraint for interactive image segmentation. It is an extension of Veksler's star-convexity prior, in two ways: from a single star to ...
Varun Gulshan, Carsten Rother, Antonio Criminisi, ...
ICML
2009
IEEE
14 years 5 months ago
Nonparametric estimation of the precision-recall curve
The Precision-Recall (PR) curve is a widely used visual tool to evaluate the performance of scoring functions in regards to their capacities to discriminate between two population...
Stéphan Clémençon, Nicolas Va...
CCGRID
2008
IEEE
14 years 4 months ago
Overlapping Communication and Computation with High Level Communication Routines
Collective operations and non-blocking point-to-point operations are two important parts of MPI that each provide important performance and programmability benefits. Although non...
Torsten Hoefler, Andrew Lumsdaine
GLOBECOM
2008
IEEE
14 years 4 months ago
Robustness Analysis of Source Localization Using Gaussianity Measure
Nowadays, the source localization has been widely applied for wireless sensor networks. The Gaussian mixture model has been adopted for maximum-likelihood (ML) source localization ...
Kun Yan, Hsiao-Chun Wu, S. S. Iyengar