Sciweavers

21 search results - page 4 / 5
» Linear and Nonlinear Arithmetic in ACL2
Sort
View
SDM
2008
SIAM
177views Data Mining» more  SDM 2008»
13 years 6 months ago
Practical Private Computation and Zero-Knowledge Tools for Privacy-Preserving Distributed Data Mining
In this paper we explore private computation built on vector addition and its applications in privacypreserving data mining. Vector addition is a surprisingly general tool for imp...
Yitao Duan, John F. Canny
CORR
2010
Springer
173views Education» more  CORR 2010»
13 years 5 months ago
Automatic Modular Abstractions for Template Numerical Constraints
c Modular Abstractions for Template Numerical Constraints David Monniaux May 26, 2010 We propose a method for automatically generating abstract transformstatic analysis by abstrac...
David Monniaux
EVOW
2003
Springer
13 years 10 months ago
Pixel Statistics and False Alarm Area in Genetic Programming for Object Detection
This paper describes a domain independent approach to the use of genetic programming for object detection problems. Rather than using raw pixels or high level domain specific feat...
Mengjie Zhang, Peter Andreae, Mark Pritchard
DCC
1995
IEEE
13 years 9 months ago
CREW: Compression with Reversible Embedded Wavelets
Compression with Reversible Embedded Wavelets (CREW) is a uni ed lossless and lossy continuous-tone still image compression system. It is wavelet-based using a \reversible" a...
A. Zandi, James D. Allen, Edward L. Schwartz, Mart...
TSP
2008
113views more  TSP 2008»
13 years 5 months ago
Avoiding Divergence in the Shalvi-Weinstein Algorithm
The most popular algorithms for blind equalization are the constant-modulus algorithm (CMA) and the ShalviWeinstein algorithm (SWA). It is well-known that SWA presents a higher co...
Maria D. Miranda, Magno T. M. Silva, Victor H. Nas...