Sciweavers

185 search results - page 34 / 37
» Efficient frame vector selection based on ordered sets
Sort
View
JHSN
2007
78views more  JHSN 2007»
13 years 7 months ago
Understanding of human behaviors from videos in nursing care monitoring systems
Abstract. This paper addresses the issue in scenario-based understanding of human behavior from videos in a nursing care monitoring system. The analysis is carried out based on exp...
Chin-De Liu, Pau-Choo Chung, Yi-Nung Chung, Moniqu...
CANS
2010
Springer
150views Cryptology» more  CANS 2010»
13 years 5 months ago
Predicate Encryption with Partial Public Keys
Abstract. Predicate encryption is a new powerful cryptographic primitive which allows for fine-grained access control for encrypted data: the owner of the secret key can release pa...
Carlo Blundo, Vincenzo Iovino, Giuseppe Persiano
VLSID
2008
IEEE
133views VLSI» more  VLSID 2008»
14 years 8 months ago
Exhaustive Enumeration of Legal Custom Instructions for Extensible Processors
Today's customizable processors allow the designer to augment the base processor with custom accelerators. By choosing appropriate set of accelerators, designer can significa...
Nagaraju Pothineni, Anshul Kumar, Kolin Paul
ICTAI
2010
IEEE
13 years 5 months ago
Comparing Approaches to Preference Dominance for Conversational Recommenders
A conversational recommender system iteratively shows a small set of options for its user to choose between. In order to select these options, the system may analyze the queries tr...
Walid Trabelsi, Nic Wilson, Derek G. Bridge, Franc...
SIGMOD
2004
ACM
184views Database» more  SIGMOD 2004»
14 years 7 months ago
CORDS: Automatic Discovery of Correlations and Soft Functional Dependencies
The rich dependency structure found in the columns of real-world relational databases can be exploited to great advantage, but can also cause query optimizers--which usually assum...
Ihab F. Ilyas, Volker Markl, Peter J. Haas, Paul B...