Sciweavers

5344 search results - page 265 / 1069
» Privacy-Preserving Set Operations
Sort
View
138
Voted
EUROGP
2005
Springer
15 years 9 months ago
Understanding Evolved Genetic Programs for a Real World Object Detection Problem
We describe an approach to understanding evolved programs for a real world object detection problem, that of finding orthodontic landmarks in cranio-facial X-Rays. The approach in...
Victor Ciesielski, Andrew Innes, Sabu John, John M...
FIMH
2005
Springer
15 years 9 months ago
Supporting the TECAB Grafting Through CT Based Analysis of Coronary Arteries
Calcified coronary arteries can cause severe cardiac problems and may provoke an infarction of the heart’s wall. An established treatment method is the bypass operation. The usa...
Stefan Wesarg
139
Voted
FPL
2005
Springer
138views Hardware» more  FPL 2005»
15 years 9 months ago
Snort Offloader: A Reconfigurable Hardware NIDS Filter
Software-based Network Intrusion Detection Systems (NIDS) often fail to keep up with high-speed network links. In this paper an FPGA-based pre-filter is presented that reduces th...
Haoyu Song, Todd S. Sproull, Michael Attig, John W...
ICCS
2005
Springer
15 years 9 months ago
Bulk Synchronous Parallel ML: Modular Implementation and Performance Prediction
Abstract. BSML is a library for parallel programming with the functional language Objective Caml. It is based on an extension of the λcalculus by parallel operations on a parallel...
Frédéric Loulergue, Fréd&eacu...
149
Voted
SAS
2005
Springer
162views Formal Methods» more  SAS 2005»
15 years 9 months ago
Boolean Heaps
We show that the idea of predicates on heap objects can be cast in the framework of predicate abstraction. This leads to an alternative view on the underlying concepts of three-val...
Andreas Podelski, Thomas Wies