We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 10,000 results
  1. Imperative Process Algebra and Models of Parallel Computation

    Studies of issues related to computability and computational complexity involve the use of a model of computation. Central in such a model are...

    Cornelis A. Middelburg in Theory of Computing Systems
    Article Open access 14 March 2024
  2. Verification and computation in restricted Tile Automata

    Many models of self-assembly have been shown to be capable of performing computation. Tile Automata was recently introduced combining features of...

    David Caballero, Timothy Gomez, ... Tim Wylie in Natural Computing
    Article 17 November 2021
  3. Federated computation: a survey of concepts and challenges

    Federated Computation is an emerging area that seeks to provide stronger privacy for user data, by performing large scale, distributed computations...

    Akash Bharadwaj, Graham Cormode in Distributed and Parallel Databases
    Article 23 November 2023
  4. Fast Symbolic Computation of Bottom SCCs

    The computation of bottom strongly connected components (BSCCs) is a fundamental task in model checking, as well as in characterizing the attractors...
    Anna Blume Jakobsen, Rasmus Skibdahl Melanchton Jørgensen, ... Andreas Pavlogiannis in Tools and Algorithms for the Construction and Analysis of Systems
    Conference paper Open access 2024
  5. Restricted Boltzmann Machines

    The restricted Boltzmann machine (RBM) is a fundamentally different model from the feed-forward network. Conventional neural networks are...
    Chapter 2023
  6. Restricted Flow Games

    Classical graph problems are defined with respect to plain graphs, namely vertices connected by possibly weighted edges. On the other hand, model...
    Ravid Alon, Orna Kupferman in Taming the Infinities of Concurrency
    Chapter 2024
  7. DIDO: Data Provenance from Restricted TLS 1.3 Websites

    Public data can be authenticated by obtaining from a trustworthy website with TLS. Private data, such as user profile, are usually restricted from...
    Kwan Yin Chan, Handong Cui, Tsz Hon Yuen in Information Security Practice and Experience
    Conference paper 2023
  8. Equivalent convolution strategy for the evolution computation in parametric active contour model

    Parametric active contour model is an efficient approach for image segmentation. However, the high cost of evolution computation has restricted their...

    Kelun Tang, Lin Lang, **aojun Zhou in Journal of Real-Time Image Processing
    Article 05 April 2024
  9. Relational Expressions for Data Transformation and Computation

    Separate programming models for data transformation (declarative) and computation (procedural) impact programmer ergonomics, code reusability and...
    David Robert Pratten, Luke Mathieson in Databases Theory and Applications
    Conference paper 2024
  10. Recommendation-based trust computation and rating prediction model for security enhancement in cloud computing systems

    The cloud service providers need to deliver cloud services based on the service level agreement to their users. The services must be secure and...

    Urvashi Rahul Saxena, Taj Alam in Service Oriented Computing and Applications
    Article 21 September 2023
  11. Boundary-restricted metric learning

    Metric learning aims to learn a distance metric to properly measure the similarities between pairwise examples. Most existing learning algorithms are...

    Shuo Chen, Chen Gong, ... Masashi Sugiyama in Machine Learning
    Article 20 September 2023
  12. On the Power of an Honest Majority in Three-Party Computation Without Broadcast

    Fully secure multiparty computation (MPC) allows a set of parties to compute some function of their inputs, while guaranteeing correctness, privacy,...

    Bar Alon, Ran Cohen, ... Tom Suad in Journal of Cryptology
    Article 07 June 2023
  13. Nonadiabatic holonomic quantum computation and its optimal control

    The geometric phase has the intrinsic property of being resistant to some types of local noises as it only depends on global properties of the...

    Yan Liang, Pu Shen, ... Zheng-Yuan Xue in Science China Information Sciences
    Article 26 July 2023
  14. The application of evolutionary computation in generative adversarial networks (GANs): a systematic literature survey

    As a subfield of deep learning (DL), generative adversarial networks (GANs) have produced impressive generative results by applying deep generative...

    Yong Wang, Qian Zhang, ... Honglei Cheng in Artificial Intelligence Review
    Article Open access 21 June 2024
  15. An expectile computation cookbook

    A substantial body of work in the last 15 years has shown that expectiles constitute an excellent candidate for becoming a standard tool in...

    Abdelaati Daouia, Gilles Stupfler, Antoine Usseglio-Carleve in Statistics and Computing
    Article 23 March 2024
  16. R3PO: Reach-Restricted Reactive Program Obfuscation and Its Applications

    In recent breakthrough results, novel use of grabled circuits yielded constructions for several primitives like Identity-Based Encryption (IBE) and...
    Kaartik Bhushan, Sai Lakshmi Bhavana Obbattu, ... Rajeev Raghunath in Public-Key Cryptography – PKC 2024
    Conference paper 2024
  17. Efficiently approaching vertical federated learning by combining data reduction and conditional computation techniques

    In this paper, a framework based on a sparse Mixture of Experts (MoE) architecture is proposed for the federated learning and application of a...

    Francesco Folino, Gianluigi Folino, ... Pietro Sabatino in Journal of Big Data
    Article Open access 28 May 2024
  18. A Survey on Analog Models of Computation

    We present a survey on analog models of computation. Analog can be understood both as computing by analogy, or as working on the continuum. We...
    Olivier Bournez, Amaury Pouly in Handbook of Computability and Complexity in Analysis
    Chapter 2021
  19. On designing the adaptive computation framework of distributed deep learning models for Internet-of-Things applications

    Deep learning methods have been gradually adopted in the Internet-of-Things (IoT) applications. Nevertheless, the large demands for the computation...

    Chia-Heng Tu, QiHui Sun, Mu-Hsuan Cheng in The Journal of Supercomputing
    Article 21 April 2021
  20. Approaches for coarsest granularity based near-optimal reduct computation

    Traditionally, the shortest length has been used as the optimality criterion in rough set based optimal / near-optimal reduct computation. A more...

    Abhimanyu Bar, P. S. V. S. Sai Prasad in Applied Intelligence
    Article 06 June 2022
Did you find what you were looking for? Share feedback.