Sciweavers

24188 search results - page 439 / 4838
» Computing on Encrypted Data
Sort
View
131
Voted
FCCM
1997
IEEE
118views VLSI» more  FCCM 1997»
15 years 9 months ago
Computing kernels implemented with a wormhole RTR CCM
The Wormhole Run-Time Reconfiguration (RTR) computing paradigm is a method for creating high performance computational pipelines. The scalability, distributed control and data pow...
Ray Bittner, Peter M. Athanas
124
Voted
CIDR
2009
159views Algorithms» more  CIDR 2009»
15 years 6 months ago
RIOT: I/O-Efficient Numerical Computing without SQL
R is a numerical computing environment that is widely popular for statistical data analysis. Like many such environments, R performs poorly for large datasets whose sizes exceed t...
Yi Zhang 0011, Herodotos Herodotou, Jun Yang 0001
PUC
2002
69views more  PUC 2002»
15 years 4 months ago
The Well Mannered Wearable Computer
: In this paper we describe continuing work being carried out as part of the Bristol Wearable Computing Initiative. We are interested in the use of context sensors to improve the u...
Cliff Randell, Henk L. Muller
JMLR
2010
162views more  JMLR 2010»
14 years 11 months ago
A Surrogate Modeling and Adaptive Sampling Toolbox for Computer Based Design
An exceedingly large number of scientific and engineering fields are confronted with the need for computer simulations to study complex, real world phenomena or solve challenging ...
Dirk Gorissen, Ivo Couckuyt, Piet Demeester, Tom D...
ICCV
2007
IEEE
16 years 6 months ago
Applications of parametric maxflow in computer vision
The maximum flow algorithm for minimizing energy functions of binary variables has become a standard tool in computer vision. In many cases, unary costs of the energy depend linea...
Vladimir Kolmogorov, Yuri Boykov, Carsten Rother