Sciweavers

3547 search results - page 219 / 710
» Computers Seeing People
Sort
View

Lecture Notes
592views
17 years 4 months ago
Stochastic Differential Equations
These lecture notes have been developed over several semesters with the assistance of students in the course. For many (most) results, only incomplete proofs are given. Gaps in the...
Thomas G. Kurtz
282
Voted

Book
321views
17 years 2 months ago
Algorithms
"This book evolved over the past ten years from a set of lecture notes developed while teaching the undergraduate Algorithms course at Berkeley and U.C. San Diego. Our way of ...
S. Dasgupta, C.H. Papadimitriou, and U.V. Vazirani
123
Voted
TCC
2009
Springer
112views Cryptology» more  TCC 2009»
16 years 5 months ago
Non-malleable Obfuscation
Existing definitions of program obfuscation do not rule out malleability attacks, where an adversary that sees an obfuscated program is able to generate another (potentially obfus...
Ran Canetti, Mayank Varia
ISCAS
2008
IEEE
124views Hardware» more  ISCAS 2008»
15 years 11 months ago
Musical beat tracking via Kalman filtering and noisy measurements selection
— We study the problem of automatic musical beat tracking from acoustic data, i.e., finding locations of beats of a music piece by computers on-the-fly, in this work. An online...
Yu Shiu, C. C. Jay Kuo
126
Voted
ACCESSNETS
2008
Springer
15 years 11 months ago
Loop Identification and Capacity Estimation of Digital Subscriber Lines with Single Ended Line Testing
Digital subscriber lines offer the possibility to deliver broadband services over the existing telephone network. Still, beforehand subscriber loops must be tested to see whether t...
Carine Neus, Wim Foubert, Leo Van Biesen