Sciweavers

4335 search results - page 248 / 867
» Privatizing Constraint Optimization
Sort
View
CCS
2010
ACM
15 years 4 months ago
TASTY: tool for automating secure two-party computations
Secure two-party computation allows two untrusting parties to jointly compute an arbitrary function on their respective private inputs while revealing no information beyond the ou...
Wilko Henecka, Stefan Kögl, Ahmad-Reza Sadegh...
INFOCOM
2011
IEEE
14 years 7 months ago
Secure and practical outsourcing of linear programming in cloud computing
—Cloud Computing has great potential of providing robust computational power to the society at reduced cost. It enables customers with limited computational resources to outsourc...
Cong Wang, Kui Ren, Jia Wang
HIPEAC
2011
Springer
14 years 4 months ago
NoC-aware cache design for multithreaded execution on tiled chip multiprocessors
In chip multiprocessors (CMPs), data accesslatency dependson the memory hierarchy organization, the on-chip interconnect (NoC), and the running workload. Reducing data access late...
Ahmed Abousamra, Alex K. Jones, Rami G. Melhem
MICCAI
2007
Springer
16 years 5 months ago
Multi-criteria Trajectory Planning for Hepatic Radiofrequency Ablation
In this paper, we propose a method based on multiple criteria to assist physicians in planning percutaneous RFA on liver. We explain how we extracted information from literature an...
Claire Baegert, Caroline Villard, Pascal Schreck, ...
CDC
2009
IEEE
131views Control Systems» more  CDC 2009»
15 years 7 months ago
An analytical solution to dynamic quantization problem of nonlinear control systems
Abstract— This paper addresses a problem of finding an optimal dynamic quantizer for nonlinear control subject to discretevalued signal constraints. The quantizers to be studied...
Shun-ichi Azuma, Toshiharu Sugie