Sciweavers

5344 search results - page 75 / 1069
» Privacy-Preserving Set Operations
Sort
View
LCPC
2001
Springer
14 years 2 months ago
Strength Reduction of Integer Division and Modulo Operations
Integer division, modulo, and remainder operations are expressive and useful operations. They are logical candidates to express complex data accesses such as the wrap-around behav...
Jeffrey Sheldon, Walter Lee, Ben Greenwald, Saman ...
HIS
2008
13 years 11 months ago
New Crossover Operator for Evolutionary Rule Discovery in XCS
XCS is a learning classifier system that combines a reinforcement learning scheme with evolutionary algorithms to evolve rule sets on-line by means of the interaction with an envi...
Sergio Morales-Ortigosa, Albert Orriols-Puig, Este...
ICIP
2001
IEEE
14 years 11 months ago
Synthesis and applications of lattice image operators based on fuzzy norms
In this paper we use concepts from the lattice-based theory of morphological operators and fuzzy sets to develop generalized lattice image operators that can be expressed as nonli...
Petros Maragos, Vassilis Tzouvaras, Giorgos B. Sta...
OSDI
2004
ACM
14 years 10 months ago
Understanding and Dealing with Operator Mistakes in Internet Services
Operator mistakes are a significant source of unavailability in modern Internet services. In this paper, we first characterize these mistakes by performing an extensive set of exp...
Fábio Oliveira, Kiran Nagaraja, Ricardo Bia...
ICCAD
2007
IEEE
131views Hardware» more  ICCAD 2007»
14 years 7 months ago
Low-overhead design technique for calibration of maximum frequency at multiple operating points
— Determination of maximum operating frequencies (Fmax) during manufacturing test at different operating voltages is required to: (a) to ensure that, for a Dynamic Voltage and Fr...
Somnath Paul, Sivasubramaniam Krishnamurthy, Hamid...