Sciweavers

2192 search results - page 162 / 439
» Embedded function composition
Sort
View
107
Voted
ACNS
2009
Springer
123views Cryptology» more  ACNS 2009»
15 years 7 months ago
Practical Secure Evaluation of Semi-private Functions
Abstract. Two-party Secure Function Evaluation (SFE) is a very useful cryptographic tool which allows two parties to evaluate a function known to both parties on their private (sec...
Annika Paus, Ahmad-Reza Sadeghi, Thomas Schneider
CASES
2007
ACM
15 years 4 months ago
Recursive function data allocation to scratch-pad memory
This paper presents the first automatic scheme to allocate local (stack) data in recursive functions to scratch-pad memory (SPM) in embedded systems. A scratch-pad is a fast direct...
Angel Dominguez, Nghi Nguyen, Rajeev Barua
142
Voted
VCBM
2010
14 years 7 months ago
Visual Analysis of Integrated Resting State Functional Brain Connectivity and Anatomy
Resting state functional magnetic resonance imaging (rs-fMRI) is an important modality in the study of the functional architecture of the human brain. The correlation between the ...
Andre F. van Dixhoorn, Bastijn H. Vissers, Luca Fe...
NJC
2000
169views more  NJC 2000»
15 years 18 days ago
A Type System for Bounded Space and Functional In-Place Update
We show how linear typing can be used to obtain functional programs which modify heap-allocated data structures in place. We present this both as a "design pattern" for ...
Martin Hofmann
107
Voted
ICML
1998
IEEE
16 years 1 months ago
Q2: Memory-Based Active Learning for Optimizing Noisy Continuous Functions
This paper introduces a new algorithm, Q2, foroptimizingthe expected output ofamultiinput noisy continuous function. Q2 is designed to need only a few experiments, it avoids stron...
Andrew W. Moore, Jeff G. Schneider, Justin A. Boya...