Sciweavers

18090 search results - page 3596 / 3618
» Computing by Only Observing
Sort
View
139
Voted
SP
2010
IEEE
190views Security Privacy» more  SP 2010»
15 years 14 days ago
Noninterference through Secure Multi-execution
A program is defined to be noninterferent if its outputs cannot be influenced by inputs at a higher security level than their own. Various researchers have demonstrated how this pr...
Dominique Devriese, Frank Piessens
108
Voted
WINE
2010
Springer
129views Economy» more  WINE 2010»
15 years 14 days ago
Optimal Pricing in the Presence of Local Network Effects
We study the optimal pricing strategies of a monopolist selling a divisible good (service) to consumers that are embedded in a social network. A key feature of our model is that c...
Ozan Candogan, Kostas Bimpikis, Asuman E. Ozdaglar
113
Voted
FLAIRS
2009
15 years 12 days ago
Analyzing Team Actions with Cascading HMM
While team action recognition has a relatively extended literature, less attention has been given to the detailed realtime analysis of the internal structure of the team actions. ...
Brandyn Allen White, Nate Blaylock, Ladislau B&oum...
132
Voted
ICCAD
2009
IEEE
89views Hardware» more  ICCAD 2009»
15 years 11 days ago
Decoupling capacitance efficient placement for reducing transient power supply noise
Decoupling capacitance (decap) is an efficient way to reduce transient noise in on-chip power supply networks. However, excessive decap may cause more leakage power, chip resource...
Xiaoyi Wang, Yici Cai, Qiang Zhou, Sheldon X.-D. T...
139
Voted
ICIP
2009
IEEE
15 years 11 days ago
Selecting representative and distinctive descriptors for efficient landmark recognition
To have a robust and informative image content representation for image categorization, we often need to extract as many as possible visual features at various locations, scales a...
Sheng Gao, Joo-Hwee Lim
« Prev « First page 3596 / 3618 Last » Next »