[HTML][HTML] Topological image modification for object detection and topological image processing of skin lesions

R Vandaele, GA Nervo, O Gevaert - Scientific Reports, 2020 - nature.com
We propose a new method based on Topological Data Analysis (TDA) consisting of
Topological Image Modification (TIM) and Topological Image P rocessing (TIP) for object …

From folklore to fact: comparing implementations of stacks and continuations

K Farvardin, J Reppy - Proceedings of the 41st ACM SIGPLAN …, 2020 - dl.acm.org
The efficient implementation of function calls and non-local control transfers is a critical part
of modern language implementations and is important in the implementation of everything …

On obfuscating compilation for encrypted computing

PT Breuer, JP Bowen, E Palomar… - … 2017-Proceedings of …, 2017 - openresearch.lsbu.ac.uk
This paper sets out conditions for privacy and security of data against the privileged operator
on processors that 'work encrypted'. A compliant machine code architecture plus an …

Superscalar encrypted RISC: The measure of a secret computer

P Breuer, J Bowen, E Palomar… - 2018 17th IEEE …, 2018 - ieeexplore.ieee.org
Appropriately modifying the arithmetic in a processor causes data to remain in encrypted
form throughout processing, providing a technical approach to privacy for the ordinary user …

Adaptive Recursive Query Optimization

A Herlihy, G Martres, A Ailamaki… - 2024 IEEE 40th …, 2024 - ieeexplore.ieee.org
Performance-critical industrial applications, including large-scale program, network, and
distributed system analyses, are increasingly reliant on recursive queries for data analysis …

Exploring a stack architecture

RP Blake - Computer, 1977 - ieeexplore.ieee.org
Computer architects design a high-performance system out of the same components that the
rest of us would use to build a common one. They do it through an understanding of how the …

Ackermann's function: a study in the efficiency of calling procedures

BA Wichmann - BIT Numerical Mathematics, 1976 - Springer
A six line recursive procedure is used to assess the efficiency of the procedure calling
mechanism in ALGOL-like languages. The results from some 40 systems varying from …

Mining topological structure in graphs through forest representations

R Vandaele, Y Saeys, T De Bie - Journal of Machine Learning Research, 2020 - jmlr.org
We consider the problem of inferring simplified topological substructures--which we term
backbones--in metric and non-metric graphs. Intuitively, these are subgraphs with'few'nodes …

Real-time simulation of a Luenberger observer applied to DC-DC converters

MH Cervantes, ACT Anguiano, JA Marin… - IEEE Latin America …, 2018 - ieeexplore.ieee.org
This paper presents a real-time simulation of a Luenberger observer for DC-DC converters.
The Luenberger observer is applied to a Buck converter in order to detect failures in the …

The secret processor will go to the ball: Benchmark insider-proof encrypted computing

PT Breuer, JP Bowen, E Palomar… - 2018 IEEE European …, 2018 - ieeexplore.ieee.org
'Encrypted computing'is an approach to preventing insider attacks by the privileged operator
against the unprivileged user on a computing system. It requires a processor that works …