Sciweavers

778 search results - page 133 / 156
» From Public Views to Private Views - Correctness-by-Design f...
Sort
View
IVC
2007
109views more  IVC 2007»
13 years 7 months ago
Hierarchical building recognition
In urban areas, buildings are often used as landmarks for localization. Reliable and efficient recognition of buildings is crucial for enabling this functionality. Motivated by t...
Wei Zhang, Jana Kosecká
SCN
2010
Springer
144views Communications» more  SCN 2010»
13 years 5 months ago
Generic Constructions of Parallel Key-Insulated Encryption
Exposure of a secret key is a significant threat in practice. As a notion of security against key exposure, Dodis et al. advocated key-insulated security, and proposed concrete k...
Goichiro Hanaoka, Jian Weng
DKE
2010
136views more  DKE 2010»
13 years 4 months ago
Application integration on the user interface level: An ontology-based approach
Integration of software applications can be achieved on different levels: the data level, the business logic level, and the user interface level. Integration on the user interface ...
Heiko Paulheim, Florian Probst
ICML
2005
IEEE
14 years 8 months ago
Healing the relevance vector machine through augmentation
The Relevance Vector Machine (RVM) is a sparse approximate Bayesian kernel method. It provides full predictive distributions for test cases. However, the predictive uncertainties ...
Carl Edward Rasmussen, Joaquin Quiñonero Ca...
WWW
2006
ACM
14 years 8 months ago
Cat and mouse: content delivery tradeoffs in web access
Web pages include extraneous material that may be viewed as undesirable by a user. Increasingly many Web sites also require users to register to access either all or portions of t...
Balachander Krishnamurthy, Craig E. Wills