Sciweavers

4890 search results - page 790 / 978
» From system specifications to component behavioral models
Sort
View
CASES
2010
ACM
13 years 8 months ago
Implementing virtual secure circuit using a custom-instruction approach
Although cryptographic algorithms are designed to resist at least thousands of years of cryptoanalysis, implementing them with either software or hardware usually leaks additional...
Zhimin Chen, Ambuj Sinha, Patrick Schaumont
MASCOTS
2008
14 years 5 days ago
Network Information Flow in Network of Queues
Two classic categories of models exist for computer networks: network information flow and network of queues. The network information flow model appropriately captures the multi-ho...
Phillipa Gill, Zongpeng Li, Anirban Mahanti, Jingx...
SCHOLARPEDIA
2008
76views more  SCHOLARPEDIA 2008»
13 years 9 months ago
Stomatogastric ganglion
ABSTRACT: The lobster stomatogastric ganglion contains 30 neurons and when modulated can produce two distinct rhythmic motor patterns--the gastric mill and the pyloric. The complet...
Allen I. Selverston
CVPR
2003
IEEE
15 years 23 days ago
Expectation Grammars: Leveraging High-Level Expectations for Activity Recognition
Video-based recognition and prediction of a temporally extended activity can benefit from a detailed description of high-level expectations about the activity. Stochastic grammars...
David Minnen, Irfan A. Essa, Thad Starner
RECSYS
2010
ACM
13 years 11 months ago
Eye-tracking product recommenders' usage
Recommender systems have emerged as an effective decision tool to help users more easily and quickly find products that they prefer, especially in e-commerce environments. However...
Sylvain Castagnos, Nicolas Jones, Pearl Pu