Sciweavers

26496 search results - page 23 / 5300
» An Approach to Computing Ethics
Sort
View
PODS
2007
ACM
122views Database» more  PODS 2007»
15 years 9 months ago
Privacy, accuracy, and consistency too: a holistic solution to contingency table release
The contingency table is a work horse of official statistics, the format of reported data for the US Census, Bureau of Labor Statistics, and the Internal Revenue Service. In many ...
Boaz Barak, Kamalika Chaudhuri, Cynthia Dwork, Sat...
122
Voted
CORR
2012
Springer
281views Education» more  CORR 2012»
13 years 5 months ago
Belief Propagation by Message Passing in Junction Trees: Computing Each Message Faster Using GPU Parallelization
Compiling Bayesian networks (BNs) to junction trees and performing belief propagation over them is among the most prominent approaches to computing posteriors in BNs. However, bel...
Lu Zheng, Ole J. Mengshoel, Jike Chong
PAMI
2012
13 years 2 days ago
BRIEF: Computing a Local Binary Descriptor Very Fast
Binary descriptors are becoming increasingly popular as a means to compare feature points very fast and while requiring comparatively small amounts of memory. The typical approach...
Michael Calonder, Vincent Lepetit, Mustafa Öz...

Lab
1058views
15 years 6 months ago
UP Electrical and Electronics Engineering Institute
The Institute's mission is to produce excellent, innovative and nationalistic engineers and to advance the field of electrical and electronics engineering. The undergr...
AISM
2004
14 years 11 months ago
Computer Security Research: Approaches and Assumptions
Researchers, no matter their field, are faced with the problem of selecting an appropriate approach before conducting a study. The purpose of this paper is to provide an overview ...
Christopher Bolan, Daniel Mende