Sciweavers

15351 search results - page 344 / 3071
» The information bottleneck method
Sort
View
133
Voted
CGF
2008
144views more  CGF 2008»
15 years 3 months ago
High Performance GPU-based Proximity Queries using Distance Fields
Proximity queries such as closest point computation and collision detection have many applications in computer graphics, including computer animation, physics-based modeling, augm...
T. Morvan, M. Reimers, E. Samset
COMCOM
2006
82views more  COMCOM 2006»
15 years 3 months ago
Traffic engineering with OSPF-TE and RSVP-TE: Flooding reduction techniques and evaluation of processing cost
This paper considers two important aspects related to the control plane of Traffic Engineered IP/MPLS networks: the ``flooding reduction'' mechanisms and the evaluation ...
Stefano Salsano, Alessio Botta, Paola Iovanna, Mar...
115
Voted
CSSE
2006
IEEE
15 years 3 months ago
Experimental analysis of a privacy-preserving scalar product protocol
The recent investigation of privacy-preserving data mining has been motivated by the growing concern about the privacy of individuals when their data is stored, aggregated, and mi...
Zhiqiang Yang, Rebecca N. Wright, Hiranmayee Subra...
ENTCS
2006
104views more  ENTCS 2006»
15 years 3 months ago
Using Bytecode Instruction Counting as Portable CPU Consumption Metric
Accounting for the CPU consumption of applications is crucial for software development to detect and remove performance bottlenecks (profiling) and to evaluate the performance of ...
Walter Binder, Jarle Hulaas
CN
2007
141views more  CN 2007»
15 years 3 months ago
Designing an overload control strategy for secure e-commerce applications
Uncontrolled overload can lead e-commerce applications to considerable revenue losses. For this reason, overload prevention in these applications is a critical issue. In this pape...
Jordi Guitart, David Carrera, Vicenç Beltra...