Sciweavers

2913 search results - page 41 / 583
» How Much to Copy
Sort
View
CORR
2007
Springer
122views Education» more  CORR 2007»
13 years 7 months ago
How to Complete a Doubling Metric
In recent years, considerable advances have been made in the study of properties of metric spaces in terms of their doubling dimension. This line of research has not only enhanced...
Anupam Gupta, Kunal Talwar
BC
1998
111views more  BC 1998»
13 years 7 months ago
How to "hear" visual disparities: real-time stereoscopic spatial depth analysis using temporal resonance
Abstract. In a stereoscopic system, both eyes or cameras have a slightly di€erent view. As a consequence, small variations between the projected images exist (`disparities') ...
Bernd Porr, Alex Cozzi, Florentin Wörgöt...
NN
1998
Springer
108views Neural Networks» more  NN 1998»
13 years 7 months ago
How embedded memory in recurrent neural network architectures helps learning long-term temporal dependencies
Learning long-term temporal dependencies with recurrent neural networks can be a difficult problem. It has recently been shown that a class of recurrent neural networks called NA...
Tsungnan Lin, Bill G. Horne, C. Lee Giles
IACR
2011
132views more  IACR 2011»
12 years 7 months ago
Tamper-Proof Circuits: How to Trade Leakage for Tamper-Resilience
Abstract. Tampering attacks are cryptanalytic attacks on the implementation of cryptographic algorithms (e.g., smart cards), where an adversary introduces faults with the hope that...
Sebastian Faust, Krzysztof Pietrzak, Daniele Ventu...
SIGSOFT
2007
ACM
14 years 8 months ago
Context-based detection of clone-related bugs
Studies show that programs contain much similar code, commonly known as clones. One of the main reasons for introducing clones is programmers' tendency to copy and paste code...
Lingxiao Jiang, Zhendong Su, Edwin Chiu