Sciweavers

4752 search results - page 19 / 951
» From computation models to models of provenance: the RWS app...
Sort
View
STOC
2005
ACM
132views Algorithms» more  STOC 2005»
14 years 7 months ago
Concurrent general composition of secure protocols in the timing model
In the setting of secure multiparty computation, a set of parties wish to to jointly compute some function of their input (i.e., they wish to securely carry out some distributed t...
Yael Tauman Kalai, Yehuda Lindell, Manoj Prabhakar...
ICPR
2008
IEEE
14 years 8 months ago
3D ear modeling and recognition from video sequences using shape from shading
We describe a novel approach for 3D ear biometrics using video. A series of frames are extracted from a video clip and the region-of-interest (ROI) in each frame is independently ...
Mohamed Abdel-Mottaleb, Steven Cadavid
CVPR
2012
IEEE
11 years 10 months ago
Image categorization using Fisher kernels of non-iid image models
The bag-of-words (BoW) model treats images as an unordered set of local regions and represents them by visual word histograms. Implicitly, regions are assumed to be identically an...
Ramazan Gokberk Cinbis, Jakob J. Verbeek, Cordelia...
ACII
2011
Springer
12 years 7 months ago
Toward a Computational Model of Affective Responses to Stories for Augmenting Narrative Generation
Current approaches to story generation do not utilize models of human affect to create stories with dramatic arc, suspense, and surprise. This paper describes current and future wo...
Brian O'Neill
ATVA
2008
Springer
131views Hardware» more  ATVA 2008»
13 years 9 months ago
Computation Tree Regular Logic for Genetic Regulatory Networks
Model checking has proven to be a useful analysis technique not only for concurrent systems, but also for the genetic regulatory networks (Grns) that govern the functioning of livi...
Radu Mateescu, Pedro T. Monteiro, Estelle Dumas, H...