Sciweavers

1585 search results - page 248 / 317
» Automatically optimizing secure computation
Sort
View
TCS
2010
14 years 10 months ago
On the complexities of consistency checking for restricted UML class diagrams
Automatic debugging of UML class diagrams helps in the visual specification of software systems because users cannot detect errors in logical consistency easily. This paper focus...
Ken Kaneiwa, Ken Satoh
ISBI
2006
IEEE
16 years 16 days ago
Head and neck lymph node region delineation using a hybrid image registration method
The success of radiation therapy depends critically on accurately delineating the target volume, which is the region of known or suspected disease in a patient. Methods that can c...
Chia-Chi Teng, Linda G. Shapiro, Ira Kalet
ECAI
2004
Springer
15 years 5 months ago
Towards Efficient Learning of Neural Network Ensembles from Arbitrarily Large Datasets
Advances in data collection technologies allow accumulation of large and high dimensional datasets and provide opportunities for learning high quality classification and regression...
Kang Peng, Zoran Obradovic, Slobodan Vucetic
EMNLP
2009
14 years 9 months ago
Web-Scale Distributional Similarity and Entity Set Expansion
Computing the pairwise semantic similarity between all words on the Web is a computationally challenging task. Parallelization and optimizations are necessary. We propose a highly...
Patrick Pantel, Eric Crestan, Arkady Borkovsky, An...
CVPR
2011
IEEE
14 years 3 months ago
Discriminative Spatial Pyramid
Spatial Pyramid Representation (SPR) is a widely used method for embedding both global and local spatial information into a feature, and it shows good performance in terms of gene...
Tatsuya Harada, Yoshitaka Ushiku, Yuya Yamashita, ...