Sciweavers

1090 search results - page 210 / 218
» Resource-Bounded Partial Evaluation
Sort
View
ICASSP
2010
IEEE
13 years 8 months ago
Privacy and security of features extracted from minutiae aggregates
This paper describes our recent analysis on the security and privacy of biometric feature vectors obtained from fingerprint minutiae. A large number of contiguous regions (cuboid...
Abhishek Nagar, Shantanu Rane, Anthony Vetro
EUROPAR
2010
Springer
13 years 8 months ago
Optimized On-Chip-Pipelined Mergesort on the Cell/B.E
Abstract. Limited bandwidth to off-chip main memory is a performance bottleneck in chip multiprocessors for streaming computations, such as Cell/B.E., and this will become even mor...
Rikard Hultén, Christoph W. Kessler, Jö...
AI
2007
Springer
13 years 8 months ago
Learning action models from plan examples using weighted MAX-SAT
AI planning requires the definition of action models using a formal action and plan description language, such as the standard Planning Domain Definition Language (PDDL), as inp...
Qiang Yang, Kangheng Wu, Yunfei Jiang
ASC
2008
13 years 8 months ago
Info-fuzzy algorithms for mining dynamic data streams
Most data mining algorithms assume static behavior of the incoming data. In the real world, the situation is different and most continuously collected data streams are generated by...
Lior Cohen, Gil Avrahami, Mark Last, Abraham Kande...
BMCBI
2010
117views more  BMCBI 2010»
13 years 8 months ago
Extracting causal relations on HIV drug resistance from literature
Background: In HIV treatment it is critical to have up-to-date resistance data of applicable drugs since HIV has a very high rate of mutation. These data are made available throug...
Quoc-Chinh Bui, Breanndán Ó Nuall&aa...