Sciweavers

5344 search results - page 49 / 1069
» Privacy-Preserving Set Operations
Sort
View
USENIX
1990
13 years 11 months ago
Why Aren't Operating Systems Getting Faster As Fast as Hardware?
This paper evaluates several hardware platforms and operating systems using a set of benchmarks that stress kernel entry/exit, file systems, and other things related to operating ...
John K. Ousterhout
ICIAP
1999
ACM
14 years 2 months ago
Learning Visual Operators from Examples: A New Paradigm in Image Processing
This paper presents a general strategy for designing efficient visual operators. The approach is highly task oriented and what constitutes the relevant information is defined by...
Hans Knutsson, Magnus Borga
IJAR
2008
67views more  IJAR 2008»
13 years 10 months ago
Implementing semantic merging operators using binary decision diagrams
There is a well-recognised need in diverse applications for reasoning with multiple, potentially inconsistent sources of information. One approach is to represent each source of i...
Nikos Gorogiannis, Anthony Hunter
CAGD
2010
88views more  CAGD 2010»
13 years 10 months ago
Topological mesh operators
Abstract. In this paper we introduce an unified framework for topological manipulation on triangulated 2manifolds with or without boundary. We show that there are two kinds of prim...
Thomas Lewiner, Hélio Lopes, Esdras Medeiro...
ECCV
2004
Springer
14 years 11 months ago
Morphological Operations on Matrix-Valued Images
The output of modern imaging techniques such as diffusion tensor MRI or the physical measurement of anisotropic behaviour in materials such as the stress-tensor consists of tensor-...
Bernhard Burgeth, Martin Welk, Christian Feddern, ...