Sciweavers

362 search results - page 41 / 73
» Kernelization through Tidying
Sort
View
CCS
2008
ACM
14 years 11 months ago
A security architecture for transient trust
In extraordinary situations, certain individuals may require access to information for which they are not normally authorized. For example, to facilitate rescue of people trapped ...
Cynthia E. Irvine, Timothy E. Levin, Paul C. Clark...
USENIX
2003
14 years 11 months ago
The Design of the {OpenBSD} Cryptographic Framework
Cryptographic transformations are a fundamental building block in many security applications and protocols. To improve performance, several vendors market hardware accelerator car...
Angelos D. Keromytis, Jason L. Wright, Theo de Raa...
UAI
2000
14 years 11 months ago
Variational Relevance Vector Machines
The Support Vector Machine (SVM) of Vapnik [9] has become widely established as one of the leading approaches to pattern recognition and machine learning. It expresses predictions...
Christopher M. Bishop, Michael E. Tipping
FCCM
2011
IEEE
241views VLSI» more  FCCM 2011»
14 years 1 months ago
Multilevel Granularity Parallelism Synthesis on FPGAs
— Recent progress in High-Level Synthesis (HLS) es has helped raise the abstraction level of FPGA programming. However implementation and performance evaluation of the HLS-genera...
Alexandros Papakonstantinou, Yun Liang, John A. St...
CVPR
2009
IEEE
1094views Computer Vision» more  CVPR 2009»
16 years 4 months ago
Uncalibrated Synthetic Aperture Photography for Defocus Control
Exaggerated defocus cannot be achieved with an ordinary compact digital camera because of its tiny sensor size, so taking pictures that draw the attention of a viewer to the subjec...
Natsumi Kusumoto, Shinsaku Hiura, Kosuke Sato