Sciweavers

5684 search results - page 112 / 1137
» Computing with active dendrites
Sort
View
TCC
2009
Springer
131views Cryptology» more  TCC 2009»
14 years 10 months ago
Secure Computability of Functions in the IT Setting with Dishonest Majority and Applications to Long-Term Security
It is well known that general secure function evaluation (SFE) with information-theoretical (IT) security is infeasible in presence of a corrupted majority in the standard model. ...
Robin Künzler, Jörn Müller-Quade, D...
PODC
1999
ACM
14 years 2 months ago
Computing Anonymously with Arbitrary Knowledge
We provide characterizations of the relations that can be computed with arbitrary knowledge on networks where all processors use the same algorithm and start from the same state (...
Paolo Boldi, Sebastiano Vigna
ICCV
2009
IEEE
15 years 2 months ago
A Theory of Active Object Localization
We present some theoretical results related to the problem of actively searching for a target in a 3D environment, under the constraint of a maximum search time. We define the o...
Alexander Andreopoulos, John K. Tsotsos
ECCV
2008
Springer
14 years 11 months ago
Learning to Recognize Activities from the Wrong View Point
Appearance features are good at discriminating activities in a fixed view, but behave poorly when aspect is changed. We describe a method to build features that are highly stable u...
Ali Farhadi, Mostafa Kamali Tabrizi
ITICSE
2006
ACM
14 years 3 months ago
Student activity in seminars: designing multi-functional assessment events
In this paper, we describe assessment in seminars where high student activity is encouraged. The aim of our work has been to design assessment events that result in deep learning ...
Karin Axelsson, Ulf Melin, Tommy Wedlund