Sciweavers

1265 search results - page 112 / 253
» Finding the Key to a Synapse
Sort
View
TCS
2002
13 years 8 months ago
Authentication tests and the structure of bundles
Suppose a principal in a cryptographic protocol creates and transmits a message containing a new value v, later receiving v back in a different cryptographic context. It can concl...
Joshua D. Guttman, F. Javier Thayer
ICDM
2010
IEEE
273views Data Mining» more  ICDM 2010»
13 years 7 months ago
Learning Maximum Lag for Grouped Graphical Granger Models
Temporal causal modeling has been a highly active research area in the last few decades. Temporal or time series data arises in a wide array of application domains ranging from med...
Amit Dhurandhar

Publication
145views
15 years 7 months ago
Segmenting Preferences and Habits of Transit Users and Non-Users
Ridership is a key goal in the transit industry. Conventional transit analysis focuses on two types of users—captive and choice riders—but rarely aims to understand the prefe...
Kevin J. Krizek, Ahmed El-Geneidy
CVPR
2009
IEEE
1133views Computer Vision» more  CVPR 2009»
15 years 4 months ago
Sparse Subspace Clustering
We propose a method based on sparse representation (SR) to cluster data drawn from multiple low-dimensional linear or affine subspaces embedded in a high-dimensional space. Our ...
Ehsan Elhamifar, René Vidal
CVPR
2007
IEEE
14 years 11 months ago
Opti-Acoustic Stereo Imaging, System Calibration and 3-D Reconstruction
Utilization of an acoustic camera for range measurements is a key advantage for 3-D shape recovery of underwater targets by opti-acoustic stereo imaging, where the associated epip...
Shahriar Negahdaripour, Hicham Sekkati, Hamed Pirs...