Sciweavers

1585 search results - page 253 / 317
» Automatically optimizing secure computation
Sort
View
CEC
2008
IEEE
15 years 6 months ago
Generating massive high-quality random numbers using GPU
— Pseudo-random number generators (PRNG) have been intensively used in many stochastic algorithms in artificial intelligence, computer graphics and other scientific computing. ...
Wai-Man Pang, Tien-Tsin Wong, Pheng-Ann Heng
ICASSP
2008
IEEE
15 years 6 months ago
Path-constrained partial music synchronization
Digital music collections often contain different versions and interpretations of a single musical work. In view of music retrieval and browsing applications, one important task, ...
Meinard Mueller, Daniel Appelt
ACIVS
2008
Springer
15 years 6 months ago
Sub-optimal Camera Selection in Practical Vision Networks through Shape Approximation
Within a camera network, the contribution of a camera to the observations of a scene depends on its viewpoint and on the scene configuration. This is a dynamic property, as the sc...
Huang Lee, Linda Tessens, Marleen Morbée, H...
ICAC
2007
IEEE
15 years 6 months ago
Time-Sharing Parallel Applications with Performance Isolation and Control
Most parallel machines, such as clusters, are spaceshared in order to isolate batch parallel applications from each other and optimize their performance. However, this leads to lo...
Bin Lin, Ananth I. Sundararaj, Peter A. Dinda
NCA
2007
IEEE
15 years 6 months ago
Using Virtualization to Improve Software Rejuvenation
In this paper, we present an approach for software rejuvenation based on automated self-healing techniques that can be easily applied to off-the-shelf Application Servers and Inte...
Luís Moura Silva, Javier Alonso, Paulo Silv...