Sciweavers

2882 search results - page 187 / 577
» Enhancements to the Voting Algorithm
Sort
View
SDM
2008
SIAM
177views Data Mining» more  SDM 2008»
15 years 5 months ago
Practical Private Computation and Zero-Knowledge Tools for Privacy-Preserving Distributed Data Mining
In this paper we explore private computation built on vector addition and its applications in privacypreserving data mining. Vector addition is a surprisingly general tool for imp...
Yitao Duan, John F. Canny
184
Voted

Source Code
7589views
17 years 7 days ago
MATLAB and Octave Functions for Computer Vision and Image Processing
Great Matlab and Octave function implementation for hot computer vision algorithms such as Feature detection via Phase Congruency, Spatial feature detection, Non-maxima suppression...
P. D. Kovesi
MWCN
2004
Springer
15 years 9 months ago
On Selecting Nodes to Improve Estimated Positions
— We consider node localization problems in ad hoc wireless networks in which two types of nodes are considered: nodes with self-locating capability like GPS and nodes with no se...
Erwan Ermel, Anne Fladenmuller, Guy Pujolle, Andr&...
IEEEPACT
1999
IEEE
15 years 8 months ago
MPEG-2 Video Decompression on Simultaneous Multithreaded Multimedia Processors
This paper explores microarchitecture models for a simultaneous multithreaded processor with multimedia enhancements. We enhance a wide-issue superscalar processor by the simultan...
Heiko Oehring, Ulrich Sigmund, Theo Ungerer
TDSC
2008
83views more  TDSC 2008»
15 years 4 months ago
A Precise Termination Condition of the Probabilistic Packet Marking Algorithm
The probabilistic packet marking (PPM) algorithm is a promising way to discover the Internet map or an attack graph that the attack packets traversed during a distributed denial-of...
T. Y. Wong, Man Hon Wong, John C. S. Lui