[HTML][HTML] Topological image modification for object detection and topological image processing of skin lesions
R Vandaele, GA Nervo, O Gevaert - Scientific Reports, 2020 - nature.com
We propose a new method based on Topological Data Analysis (TDA) consisting of
Topological Image Modification (TIM) and Topological Image P rocessing (TIP) for object …
Topological Image Modification (TIM) and Topological Image P rocessing (TIP) for object …
From folklore to fact: comparing implementations of stacks and continuations
K Farvardin, J Reppy - Proceedings of the 41st ACM SIGPLAN …, 2020 - dl.acm.org
The efficient implementation of function calls and non-local control transfers is a critical part
of modern language implementations and is important in the implementation of everything …
of modern language implementations and is important in the implementation of everything …
On obfuscating compilation for encrypted computing
This paper sets out conditions for privacy and security of data against the privileged operator
on processors that 'work encrypted'. A compliant machine code architecture plus an …
on processors that 'work encrypted'. A compliant machine code architecture plus an …
Superscalar encrypted RISC: The measure of a secret computer
Appropriately modifying the arithmetic in a processor causes data to remain in encrypted
form throughout processing, providing a technical approach to privacy for the ordinary user …
form throughout processing, providing a technical approach to privacy for the ordinary user …
Adaptive Recursive Query Optimization
Performance-critical industrial applications, including large-scale program, network, and
distributed system analyses, are increasingly reliant on recursive queries for data analysis …
distributed system analyses, are increasingly reliant on recursive queries for data analysis …
Exploring a stack architecture
RP Blake - Computer, 1977 - ieeexplore.ieee.org
Computer architects design a high-performance system out of the same components that the
rest of us would use to build a common one. They do it through an understanding of how the …
rest of us would use to build a common one. They do it through an understanding of how the …
Ackermann's function: a study in the efficiency of calling procedures
BA Wichmann - BIT Numerical Mathematics, 1976 - Springer
A six line recursive procedure is used to assess the efficiency of the procedure calling
mechanism in ALGOL-like languages. The results from some 40 systems varying from …
mechanism in ALGOL-like languages. The results from some 40 systems varying from …
Mining topological structure in graphs through forest representations
We consider the problem of inferring simplified topological substructures--which we term
backbones--in metric and non-metric graphs. Intuitively, these are subgraphs with'few'nodes …
backbones--in metric and non-metric graphs. Intuitively, these are subgraphs with'few'nodes …
Real-time simulation of a Luenberger observer applied to DC-DC converters
MH Cervantes, ACT Anguiano, JA Marin… - IEEE Latin America …, 2018 - ieeexplore.ieee.org
This paper presents a real-time simulation of a Luenberger observer for DC-DC converters.
The Luenberger observer is applied to a Buck converter in order to detect failures in the …
The Luenberger observer is applied to a Buck converter in order to detect failures in the …
The secret processor will go to the ball: Benchmark insider-proof encrypted computing
'Encrypted computing'is an approach to preventing insider attacks by the privileged operator
against the unprivileged user on a computing system. It requires a processor that works …
against the unprivileged user on a computing system. It requires a processor that works …