Sciweavers

1207 search results - page 100 / 242
» Towards optimal k-anonymization
Sort
View
95
Voted
CMPB
2010
96views more  CMPB 2010»
15 years 1 months ago
Towards real-time radiation therapy: GPU accelerated superposition/convolution
We demonstrate the use of highly parallel graphics processing units (GPUs) to accelerate the Superposition/Convolution (S/C) algorithm to interactive rates while reducing the numbe...
Robert Jacques, Russell Taylor, John Wong, Todd Mc...
JSC
2006
71views more  JSC 2006»
15 years 27 days ago
Towards a clausal analysis of cut-elimination
In this paper we show that a large class of cut-elimination methods can be analyzed by clause terms representing sets of characteristic clauses extractable from the original proof...
Matthias Baaz, Alexander Leitsch
TMC
2008
114views more  TMC 2008»
15 years 25 days ago
Toward Reliable and Efficient Reporting in Wireless Sensor Networks
Energy efficiency is one of the major concerns in wireless sensor networks, since it impacts the network lifetime. In this paper, we investigate the relationship between sensor net...
Fatma Bouabdallah, Nizar Bouabdallah, Raouf Boutab...
AI
1999
Springer
15 years 19 days ago
Towards a Characterisation of the Behaviour of Stochastic Local Search Algorithms for SAT
Stochastic local search (SLS) algorithms have been successfully applied to hard combinatorial problems from different domains. Due to their inherent randomness, the run-time behav...
Holger H. Hoos, Thomas Stützle
JCS
2002
103views more  JCS 2002»
15 years 19 days ago
Toward Cost-Sensitive Modeling for Intrusion Detection and Response
Intrusion detection systems (IDSs) must maximize the realization of security goals while minimizing costs. In this paper, we study the problem of building cost-sensitive intrusion...
Wenke Lee, Wei Fan, Matthew Miller, Salvatore J. S...