Sciweavers

24741 search results - page 4903 / 4949
» Virtual Network Computing
Sort
View
ICRA
2002
IEEE
100views Robotics» more  ICRA 2002»
14 years 3 months ago
Achieving Sharp Deliveries in Supply Chains through Variance Pool Allocation
Variability reduction and business process synchronization are acknowledged as key to achieving sharp and timely deliveries in supply chain networks. In this paper, we develop an ...
Dinesh Garg, Yadati Narahari, Nukala Viswanadham
SIGMOD
2010
ACM
324views Database» more  SIGMOD 2010»
14 years 2 months ago
Similarity search and locality sensitive hashing using ternary content addressable memories
Similarity search methods are widely used as kernels in various data mining and machine learning applications including those in computational biology, web search/clustering. Near...
Rajendra Shinde, Ashish Goel, Pankaj Gupta, Debojy...
EUROCRYPT
2010
Springer
14 years 2 months ago
Adaptively Secure Broadcast
A broadcast protocol allows a sender to distribute a message through a point-to-point network to a set of parties, such that (i) all parties receive the same message, even if the s...
Martin Hirt, Vassilis Zikas
ICS
2010
Tsinghua U.
14 years 2 months ago
Large-scale FFT on GPU clusters
A GPU cluster is a cluster equipped with GPU devices. Excellent acceleration is achievable for computation-intensive tasks (e.g. matrix multiplication and LINPACK) and bandwidth-i...
Yifeng Chen, Xiang Cui, Hong Mei
MM
2009
ACM
203views Multimedia» more  MM 2009»
14 years 2 months ago
Distance metric learning from uncertain side information with application to automated photo tagging
Automated photo tagging is essential to make massive unlabeled photos searchable by text search engines. Conventional image annotation approaches, though working reasonably well o...
Lei Wu, Steven C. H. Hoi, Rong Jin, Jianke Zhu, Ne...
« Prev « First page 4903 / 4949 Last » Next »