Sciweavers

3897 search results - page 729 / 780
» complexity 2010
Sort
View
CRYPTO
2010
Springer
208views Cryptology» more  CRYPTO 2010»
13 years 10 months ago
Improved Delegation of Computation Using Fully Homomorphic Encryption
Following Gennaro, Gentry, and Parno (Cryptology ePrint Archive 2009/547), we use fully homomorphic encryption to design improved schemes for delegating computation. In such schem...
Kai-Min Chung, Yael Kalai, Salil P. Vadhan
DAC
2010
ACM
13 years 10 months ago
Detecting tangled logic structures in VLSI netlists
This work proposes a new problem of identifying large and tangled logic structures in a synthesized netlist. Large groups of cells that are highly interconnected to each other can...
Tanuj Jindal, Charles J. Alpert, Jiang Hu, Zhuo Li...
DAGM
2010
Springer
13 years 10 months ago
Gaussian Mixture Modeling with Gaussian Process Latent Variable Models
Density modeling is notoriously difficult for high dimensional data. One approach to the problem is to search for a lower dimensional manifold which captures the main characteristi...
Hannes Nickisch, Carl Edward Rasmussen
DMSN
2010
ACM
13 years 10 months ago
DEMS: a data mining based technique to handle missing data in mobile sensor network applications
In Mobile Sensor Network (MSN) applications, sensors move to increase the area of coverage and/or to compensate for the failure of other sensors. In such applications, loss or cor...
Le Gruenwald, Md. Shiblee Sadik, Rahul Shukla, Han...
GECCO
2010
Springer
186views Optimization» more  GECCO 2010»
13 years 10 months ago
Genetic rule extraction optimizing brier score
Most highly accurate predictive modeling techniques produce opaque models. When comprehensible models are required, rule extraction is sometimes used to generate a transparent mod...
Ulf Johansson, Rikard König, Lars Niklasson