Sciweavers

24188 search results - page 442 / 4838
» Computing on Encrypted Data
Sort
View
CORR
2012
Springer
281views Education» more  CORR 2012»
14 years 21 days ago
Belief Propagation by Message Passing in Junction Trees: Computing Each Message Faster Using GPU Parallelization
Compiling Bayesian networks (BNs) to junction trees and performing belief propagation over them is among the most prominent approaches to computing posteriors in BNs. However, bel...
Lu Zheng, Ole J. Mengshoel, Jike Chong
MICCAI
2006
Springer
16 years 5 months ago
Shape Filtering for False Positive Reduction at Computed Tomography Colonography
Abstract. In this paper, we treat the problem of reducing the false positives (FP) in the automatic detection of colorectal polyps at Computer Aided Detection in Computed Tomograph...
Abhilash A. Miranda, Tarik A. Chowdhury, Ovidiu Gh...
ICML
2007
IEEE
16 years 5 months ago
Efficiently computing minimax expected-size confidence regions
Given observed data and a collection of parameterized candidate models, a 1- confidence region in parameter space provides useful insight as to those models which are a good fit t...
Brent Bryan, H. Brendan McMahan, Chad M. Schafer, ...
CHI
2005
ACM
16 years 5 months ago
Automating the detection of breaks in continuous user experience with computer games
This paper describes an approach towards automating the identification of design problems with three-dimensional mediated or gaming environments through the capture and query of u...
Tim Marsh, Kiyoung Yang, Cyrus Shahabi, Wee Ling W...
INDIASE
2009
ACM
15 years 11 months ago
Computing dynamic clusters
When trying to reverse engineer software, execution trace analysis is increasingly used. Though, by using this technique we are quickly faced with an enormous amount of data that ...
Philippe Dugerdil, Sebastien Jossi