Sciweavers

3224 search results - page 322 / 645
» Review of Affective Computing
Sort
View
FC
2009
Springer
84views Cryptology» more  FC 2009»
15 years 9 months ago
Private Intersection of Certified Sets
Abstract. This paper introduces certified sets to the private set intersection problem. A private set intersection protocol allows Alice and Bob to jointly compute the set intersec...
Jan Camenisch, Gregory M. Zaverucha
126
Voted
ARC
2006
Springer
120views Hardware» more  ARC 2006»
15 years 8 months ago
Applications of Small-Scale Reconfigurability to Graphics Processors
We explore the application of Small-Scale Reconfigurability (SSR) to graphics hardware. SSR is an architectural technique wherein functionality common to multiple subunits is reuse...
Kevin Dale, Jeremy W. Sheaffer, Vinu Vijay Kumar, ...
FORMATS
2006
Springer
15 years 8 months ago
Model Checking Timed Automata with Priorities Using DBM Subtraction
In this paper we describe an extension of timed automata with priorities, and efficient algorithms to compute subtraction on DBMs (difference bounded matrices), needed in symbolic ...
Alexandre David, John Håkansson, Kim Guldstr...
GECCO
2006
Springer
168views Optimization» more  GECCO 2006»
15 years 8 months ago
A Bayesian approach to learning classifier systems in uncertain environments
In this paper we propose a Bayesian framework for XCS [9], called BXCS. Following [4], we use probability distributions to represent the uncertainty over the classifier estimates ...
Davide Aliprandi, Alex Mancastroppa, Matteo Matteu...
MM
1995
ACM
89views Multimedia» more  MM 1995»
15 years 8 months ago
A Resolution Independent Video Language
As common as video processing is, programmers still implement video programs as manipulations of arrays of pixels. This paper presents a language extension called Rivl (pronounced...
Jonathan Swartz, Brian C. Smith