Sciweavers

2173 search results - page 215 / 435
» Building computer models from small pieces
Sort
View
TCC
2007
Springer
93views Cryptology» more  TCC 2007»
15 years 10 months ago
Intrusion-Resilient Key Exchange in the Bounded Retrieval Model
Abstract. We construct an intrusion-resilient symmetric-key authenticated key exchange (AKE) protocol in the bounded retrieval model. The model employs a long shared private key to...
David Cash, Yan Zong Ding, Yevgeniy Dodis, Wenke L...
CDC
2009
IEEE
133views Control Systems» more  CDC 2009»
15 years 9 months ago
A symbolic model approach to the digital control of nonlinear time-delay systems
— In this paper we propose an approach to control design of nonlinear time–delay systems, which is based on the construction of symbolic models, where each symbolic state and e...
Giordano Pola, Pierdomenico Pepe, Maria Domenica D...
CVPR
2011
IEEE
15 years 20 days ago
Particle Filter with State Permutations for Solving Image Jigsaw Puzzles
We deal with an image jigsaw puzzle problem, which is defined as reconstructing an image from a set of square and non-overlapping image patches. It is known that a general instan...
Xingwei Yang, Nagesh Adluru, LonginJan Latecki
CVPR
2005
IEEE
16 years 6 months ago
Detecting, Localizing and Recovering Kinematics of Textured Animals
We develop and demonstrate an object recognition system capable of accurately detecting, localizing, and recovering the kinematic configuration of textured animals in real images....
Deva Ramanan, David A. Forsyth, Kobus Barnard
BMCBI
2010
150views more  BMCBI 2010»
15 years 1 months ago
Kernel based methods for accelerated failure time model with ultra-high dimensional data
Background: Most genomic data have ultra-high dimensions with more than 10,000 genes (probes). Regularization methods with L1 and Lp penalty have been extensively studied in survi...
Zhenqiu Liu, Dechang Chen, Ming Tan, Feng Jiang, R...