Sciweavers

1246 search results - page 215 / 250
» Activity Modeling Using Event Probability Sequences
Sort
View
POPL
2009
ACM
14 years 8 months ago
Formal certification of code-based cryptographic proofs
As cryptographic proofs have become essentially unverifiable, cryptographers have argued in favor of developing techniques that help tame the complexity of their proofs. Game-base...
Benjamin Grégoire, Gilles Barthe, Santiago ...
IJRR
2010
88views more  IJRR 2010»
13 years 2 months ago
Extracting Object Contours with the Sweep of a Robotic Whisker Using Torque Information
Several recent studies have investigated the problem of object feature extraction with artificial whiskers. Many of these studies have used an approach in which the whisker is rot...
Joseph H. Solomon, Mitra J. Z. Hartmann
BMCBI
2008
155views more  BMCBI 2008»
13 years 7 months ago
Prediction of regulatory elements in mammalian genomes using chromatin signatures
Background: Recent genomic scale survey of epigenetic states in the mammalian genomes has shown that promoters and enhancers are correlated with distinct chromatin signatures, pro...
Kyoung-Jae Won, Iouri Chepelev, Bing Ren, Wei Wang
AVSS
2005
IEEE
14 years 1 months ago
Stereo person tracking with short and long term plan-view appearance models of shape and color
Copyright 2005 IEEE. Published in the 2005 International Conference on Advanced Video and Signal-based Surveillance (AVSS-2005), September 15-16, 2005, Como, Italy. Personal use o...
Michael Harville
TKDE
2008
122views more  TKDE 2008»
13 years 7 months ago
Protection of Database Security via Collaborative Inference Detection
Malicious users can exploit the correlation among data to infer sensitive information from a series of seemingly innocuous data accesses. Thus, we develop an inference violation d...
Yu Chen, Wesley W. Chu