Sciweavers

5344 search results - page 82 / 1069
» Privacy-Preserving Set Operations
Sort
View
IJCV
2011
163views more  IJCV 2011»
13 years 1 months ago
Operator Splittings, Bregman Methods and Frame Shrinkage in Image Processing
We examine the underlying structure of popular algorithms for variational methods used in image processing. We focus here on operator splittings and Bregman methods based on a uniï...
Simon Setzer
HPCA
2009
IEEE
14 years 10 months ago
Voltage emergency prediction: Using signatures to reduce operating margins
Inductive noise forces microprocessor designers to sacrifice performance in order to ensure correct and reliable operation of their designs. The possibility of wide fluctuations i...
Vijay Janapa Reddi, Meeta Sharma Gupta, Glenn H. H...
GECCO
2009
Springer
133views Optimization» more  GECCO 2009»
14 years 2 months ago
Evolutionary codings and operators for the terminal assignment problem
Given a collection of terminals, each with a demand, a collection of concentrators, each with a capacity, and costs of connecting the terminals to the concentrators, the terminal ...
Bryant A. Julstrom
HPDC
1998
IEEE
14 years 2 months ago
WebOS: Operating System Services for Wide Area Applications
In this paper, we argue for the power of providing a common set of OS services to wide area applications, including mechanisms for resource discovery, a global namespace, remote p...
Amin Vahdat, Thomas E. Anderson, Michael Dahlin, E...
SWAT
1992
Springer
101views Algorithms» more  SWAT 1992»
14 years 2 months ago
Parallel Algorithms for Priority Queue Operations
This paper presents parallel algorithms for priority queue operations on a p-processor EREWPRAM. The algorithms are based on a new data structure, the Min-path Heap (MH), which is...
Maria Cristina Pinotti, Geppino Pucci