Sciweavers

2996 search results - page 66 / 600
» Information Modeling in the Time of the Revolution
Sort
View
DMIN
2010
262views Data Mining» more  DMIN 2010»
13 years 5 months ago
SMO-Style Algorithms for Learning Using Privileged Information
Recently Vapnik et al. [11, 12, 13] introduced a new learning model, called Learning Using Privileged Information (LUPI). In this model, along with standard training data, the tea...
Dmitry Pechyony, Rauf Izmailov, Akshay Vashist, Vl...
EUROPKI
2007
Springer
13 years 11 months ago
Time Capsule Signature: Efficient and Provably Secure Constructions
Time Capsule Signature, first formalized by Dodis and Yum in Financial Cryptography 2005, is a digital signature scheme which allows a signature to bear a (future) time t so that t...
Bessie C. Hu, Duncan S. Wong, Qiong Huang, Guomin ...
AIM
2002
13 years 7 months ago
Computational Vulnerability Analysis for Information Survivability
The Infrastructure of modern society is controlled by software systems. These systems are vulnerable to attacks; several such attacks, launched by "recreation hackers" h...
Howard E. Shrobe
ICPR
2002
IEEE
14 years 8 months ago
3D Real-Time Head Tracking Fusing Color Histograms and Stereovision
A system that performs the tracking of a human head in 3D in real time is presented. The head shape is modeled by an ellipse with a trained color histogram of skin and hair sample...
Francesc Moreno, Adrià Tarrida, Juan Andrad...
DAC
2006
ACM
14 years 8 months ago
Efficient detection and exploitation of infeasible paths for software timing analysis
Accurate estimation of the worst-case execution time (WCET) of a program is important for real-time embedded software. Static WCET estimation involves program path analysis and ar...
Vivy Suhendra, Tulika Mitra, Abhik Roychoudhury, T...