Sciweavers

2849 search results - page 12 / 570
» As We Should Have Thought
Sort
View
CRYPTO
2003
Springer
132views Cryptology» more  CRYPTO 2003»
14 years 18 days ago
On Cryptographic Assumptions and Challenges
We deal with computational assumptions needed in order to design secure cryptographic schemes. We suggest a classi£cation of such assumptions based on the complexity of falsifying...
Moni Naor
ICCV
2009
IEEE
15 years 10 days ago
Poselets: Body Part Detectors Trained Using 3D Human Pose Annotations
We address the classic problems of detection, segmenta- tion and pose estimation of people in images with a novel definition of a part, a poselet. We postulate two criteria (1) ...
Lubomir Bourdev, Jitendra Malik
SIGUCCS
2003
ACM
14 years 18 days ago
Deep in the heart of client services: it's not just about hardware and software
“Client Services”, “User Services”, “Customer Service”: whatever we call it at our various colleges and universities, it’s not just about fixing hardware and softwar...
Cynthia A. Murnan
SIGCSE
1998
ACM
99views Education» more  SIGCSE 1998»
13 years 11 months ago
The ExCon project: advocating continuous examination
In this paper it is claimed that traditional examination often is destructive to the process of learning. It does not matter how good intentions educators have, it is the way they...
Urban Nuldén
AFP
2004
Springer
105views Formal Methods» more  AFP 2004»
14 years 23 days ago
Epigram: Practical Programming with Dependent Types
Abstraction and application, tupling and projection: these provide the ‘software engineering’ superstructure for programs, and our familiar type systems ensure that these opera...
Conor McBride