Sciweavers

3134 search results - page 191 / 627
» Computing full disjunctions
Sort
View
NDSS
2008
IEEE
15 years 10 months ago
Analysis-Resistant Malware
Traditionally, techniques for computing on encrypted data have been proposed with privacy preserving applications in mind. Several current cryptosystems support a homomorphic oper...
John Bethencourt, Dawn Song, Brent Waters
141
Voted
IPPS
2002
IEEE
15 years 8 months ago
Adaptive Soft Real-Time Java within Heterogeneous Environments
Traditional real-time software development methodologies require full knowledge of the resource capability of target platforms during the development stage. However, such knowledg...
Matt W. Mutka, Ren-Song Ko
SIGUCCS
2005
ACM
15 years 9 months ago
Imaging, security, configuration, and maintenance for the masses
Educational Partnerships and Learning Technologies (EPLT) [1] at the University of Washington maintains and supports a fleet of approximately 1,000 general-access student computin...
Brandon Koeller, Karalee Woody
ECCV
2008
Springer
16 years 5 months ago
Implementing Decision Trees and Forests on a GPU
We describe a method for implementing the evaluation and training of decision trees and forests entirely on a GPU, and show how this method can be used in the context of object rec...
Toby Sharp
130
Voted
EUROPAR
2009
Springer
15 years 10 months ago
Adaptive Parallel Householder Bidiagonalization
With the increasing use of large image and video archives and high-resolution multimedia data streams in many of today’s research and application areas, there is a growing need f...
Fangbin Liu, Frank J. Seinstra