Sciweavers

747 search results - page 49 / 150
» Using and Combining Predictors That Specialize
Sort
View
COMPSAC
2011
IEEE
12 years 8 months ago
L1 - An Intermediate Language for Mixed-Protocol Secure Computation
—Secure Computation (SC) enables secure distributed computation of arbitrary functions of private inputs. It has many useful applications, e.g. benchmarking or auctions. Several ...
Axel Schröpfer, Florian Kerschbaum, Guenter M...
MICRO
2002
IEEE
131views Hardware» more  MICRO 2002»
14 years 1 months ago
Pointer cache assisted prefetching
Data prefetching effectively reduces the negative effects of long load latencies on the performance of modern processors. Hardware prefetchers employ hardware structures to predic...
Jamison D. Collins, Suleyman Sair, Brad Calder, De...
IBPRIA
2005
Springer
14 years 2 months ago
The Contribution of External Features to Face Recognition
In this paper we propose a face recognition algorithm that combines internal and external information of face images. Most of the previous works dealing with face recognition use o...
Àgata Lapedriza, David Masip, Jordi Vitri&a...
ICASSP
2009
IEEE
14 years 3 months ago
Compressive spectral estimation for nonstationary random processes
We propose a “compressive” estimator of the Wigner-Ville spectrum (WVS) for time-frequency sparse, underspread, nonstationary random processes. A novel WVS estimator involving...
Alexander Jung, Georg Tauböck, Franz Hlawatsc...
ACIVS
2005
Springer
14 years 2 months ago
Cleaning and Enhancing Historical Document Images
In this paper we present a recursive algorithm for the cleaning and the enhancing of historical documents. Most of the algorithms, used to clean and enhance documents or transform ...
Ergina Kavallieratou, Hera Antonopoulou