Sciweavers

5344 search results - page 365 / 1069
» Privacy-Preserving Set Operations
Sort
View
134
Voted
FCCM
2005
IEEE
106views VLSI» more  FCCM 2005»
15 years 10 months ago
High-Performance FPGA-Based General Reduction Methods
FPGA-based floating-point kernels must exploit algorithmic parallelism and use deeply pipelined cores to gain a performance advantage over general-purpose processors. Inability t...
Gerald R. Morris, Ling Zhuo, Viktor K. Prasanna
GRC
2005
IEEE
15 years 10 months ago
An evolution strategy for the induction of fuzzy finite-state automata
: This study presents an evolution strategy used to infer fuzzy finite-state automata from examples of a fuzzy language. We describe the fitness function of an generated automata w...
Zhiwen Mo, Min Wan, Lan Shu
ISMAR
2005
IEEE
15 years 10 months ago
Shading and Shadowing of Architecture in Mixed Reality
We propose a simple method to express shading and shadowing of virtual objects in Mixed Reality especially appropriate for static architecture models in outdoor scenes. We create ...
Tetsuya Kakuta, Takeshi Oishi, Katsushi Ikeuchi
WECWIS
2005
IEEE
95views ECommerce» more  WECWIS 2005»
15 years 10 months ago
Managing Supply Chains of Software as a Service through Agent Negotiations
This paper introduces a new mediation mechanism into agent negotiations. The negotiation mechanism takes a supply-chain perspective to the construction of software services, attem...
Jung-Ching Chen, Nicolas E. Gold, Nikolay Mehandji...
ICANN
2005
Springer
15 years 10 months ago
Improved, Simpler Neural Controllers for Lamprey Swimming
Swimming for the lamprey (an eel-like fish) is governed by activity in its spinal neural network, called a central pattern generator (CPG). Simpler, alternative controllers can be...
Leena N. Patel, John Hallam, Alan F. Murray