Sciweavers

1207 search results - page 96 / 242
» Towards optimal k-anonymization
Sort
View
103
Voted
MICCAI
1999
Springer
15 years 5 months ago
Towards a Better Comprehension of Similarity Measures Used in Medical Image Registration
While intensity-based similarity measures are increasingly used for medical image registration, they often rely on implicit assumptions regarding the physics of imaging. The motiva...
Alexis Roche, Grégoire Malandain, Nicholas ...
78
Voted
IPPS
1998
IEEE
15 years 5 months ago
Toward a Universal Mapping Algorithm for Accessing Trees in Parallel Memory Systems
We study the problem of mapping the N nodes of a complete t-ary tree on M memory modules so that they can be accessed in parallel by templates, i.e. distinct sets of nodes. Typica...
Vincenzo Auletta, Sajal K. Das, Amelia De Vivo, Ma...
114
Voted
STOC
1998
ACM
135views Algorithms» more  STOC 1998»
15 years 5 months ago
Checking Polynomial Identities over any Field: Towards a Derandomization?
We present a Monte Carlo algorithm for testing multivariate polynomial identities over any field using fewer random bits than other methods. To test if a polynomial P(x1 ::: xn) ...
Daniel Lewin, Salil P. Vadhan
113
Voted
JELIA
1998
Springer
15 years 5 months ago
Towards State Update Axioms: Reifying Successor State Axioms
Successor state axioms are an optimal solution to the famous Frame Problem in reasoning about actions--but only as far as its representational aspect is concerned. We show how by g...
Michael Thielscher
ICCAD
1994
IEEE
144views Hardware» more  ICCAD 1994»
15 years 5 months ago
Power analysis of embedded software: a first step towards software power minimization
Embedded computer systems are characterized by the presence of a dedicated processor and the software that runs on it. Power constraints are increasingly becoming the critical com...
Vivek Tiwari, Sharad Malik, Andrew Wolfe