Sciweavers

1585 search results - page 281 / 317
» Automatically optimizing secure computation
Sort
View
ISBI
2004
IEEE
16 years 15 days ago
Vascular Segmentation in Three-Dimensional Rotational Angiography Based on Maximum Intensity Projections
Three-dimensional rotational angiography (3D-RA) is a relatively new and promising technique for imaging blood vessels. In this paper, we propose a novel 3D-RA vascular segmentati...
Rui Gan, Albert C. S. Chung, Wilbur C. K. Wong, Si...
PKDD
2009
Springer
152views Data Mining» more  PKDD 2009»
15 years 6 months ago
Feature Selection for Value Function Approximation Using Bayesian Model Selection
Abstract. Feature selection in reinforcement learning (RL), i.e. choosing basis functions such that useful approximations of the unkown value function can be obtained, is one of th...
Tobias Jung, Peter Stone
IEEEPACT
2008
IEEE
15 years 6 months ago
A tuning framework for software-managed memory hierarchies
Achieving good performance on a modern machine with a multi-level memory hierarchy, and in particular on a machine with software-managed memories, requires precise tuning of progr...
Manman Ren, Ji Young Park, Mike Houston, Alex Aike...
MMM
2008
Springer
217views Multimedia» more  MMM 2008»
15 years 6 months ago
Emotion-Based Music Visualization Using Photos
Music players for personal computers are often featured with music visualization by generating animated patterns according to the music’s low-level features such as loudness and ...
Chin-Han Chen, Ming-Fang Weng, Shyh-Kang Jeng, Yun...
GLVLSI
2007
IEEE
187views VLSI» more  GLVLSI 2007»
15 years 6 months ago
DAG based library-free technology mapping
This paper proposes a library-free technology mapping algorithm to reduce delay in combinational circuits. The algorithm reduces the overall number of series transistors through t...
Felipe S. Marques, Leomar S. da Rosa Jr., Renato P...