Sciweavers

2652 search results - page 315 / 531
» Privacy-preserving linear programming
Sort
View
114
Voted
ICPR
2008
IEEE
15 years 9 months ago
A fast revised simplex method for SVM training
Active set methods for training the Support Vector Machines (SVM) are advantageous since they enable incremental training and, as we show in this research, do not exhibit exponent...
Christopher Sentelle, Georgios C. Anagnostopoulos,...
ICRA
2008
IEEE
164views Robotics» more  ICRA 2008»
15 years 9 months ago
Central axis approach for computing n-finger force-closure grasps
— In this paper, we propose a new approach for computing force-closure grasps of two-dimensional and threedimensional objects. Assuming n hard-finger contact with Coulomb fricti...
Belkacem Bounab, Daniel Sidobre, Abdelouhab Zaatri
120
Voted
ISQED
2008
IEEE
153views Hardware» more  ISQED 2008»
15 years 9 months ago
ILP Based Gate Leakage Optimization Using DKCMOS Library during RTL Synthesis
In this paper dual-K (DKCMOS) technology is proposed as a method for gate leakage power reduction. An integer linear programming (ILP) based algorithm is proposed for its optimiza...
Saraju P. Mohanty
LICS
2008
IEEE
15 years 9 months ago
Hiding Local State in Direct Style: A Higher-Order Anti-Frame Rule
Separation logic involves two dual forms of modularity: local reasoning makes part of the store invisible within a static scope, whereas hiding local state makes part of the store...
François Pottier
121
Voted
PIMRC
2008
IEEE
15 years 9 months ago
An optimization framework for the joint routing and scheduling in Wireless Mesh Networks
—In this paper, we address the problem of computing the transport capacity of Wireless Mesh Networks dedicated to Internet access. Routing and transmission scheduling have a majo...
Christelle Molle, Fabrice Peix, Hervé Rivan...