Sciweavers

1210 search results - page 215 / 242
» Newton's method and its use in optimization
Sort
View
SDM
2007
SIAM
204views Data Mining» more  SDM 2007»
15 years 1 months ago
Flexible Anonymization For Privacy Preserving Data Publishing: A Systematic Search Based Approach
k-anonymity is a popular measure of privacy for data publishing: It measures the risk of identity-disclosure of individuals whose personal information are released in the form of ...
Bijit Hore, Ravi Chandra Jammalamadaka, Sharad Meh...
ARC
2010
Springer
183views Hardware» more  ARC 2010»
14 years 12 months ago
Integrated Design Environment for Reconfigurable HPC
Using FPGAs to accelerate High Performance Computing (HPC) applications is attractive, but has a huge associated cost: the time spent, not for developing efficient FPGA code but fo...
Lilian Janin, Shoujie Li, Doug Edwards
IJCV
2007
144views more  IJCV 2007»
14 years 11 months ago
Generalized Gradients: Priors on Minimization Flows
This paper tackles an important aspect of the variational problem underlying active contours: optimization by gradient flows. Classically, the definition of a gradient depends d...
Guillaume Charpiat, Pierre Maurel, Jean-Philippe P...
TON
1998
186views more  TON 1998»
14 years 11 months ago
Virtual path control for ATM networks with call level quality of service guarantees
— The configuration of virtual path (VP) connection services is expected to play an important role in the operation of large-scale asynchronous transfer mode (ATM) networks. A m...
Nikolaos Anerousis, Aurel A. Lazar
TSMC
1998
82views more  TSMC 1998»
14 years 11 months ago
To push or not to push: on the rearrangement of movable objects by a mobile robot
—We formulate and address the problem of planning a pushing manipulation by a mobile robot which tries to rearrange several movable objects in its work space. We present an algor...
Ohad Ben-Shahar, Ehud Rivlin