Sciweavers

12981 search results - page 2586 / 2597
» Model Checking and Abstraction
Sort
View
SIAMSC
2011
142views more  SIAMSC 2011»
13 years 2 months ago
Efficiency Based Adaptive Local Refinement for First-Order System Least-Squares Formulations
Abstract. In this paper, we propose new adaptive local refinement (ALR) strategies for firstorder system least-squares (FOSLS) finite element in conjunction with algebraic multi...
J. H. Adler, Thomas A. Manteuffel, Stephen F. McCo...
TMM
2011
146views more  TMM 2011»
13 years 2 months ago
Game-Theoretic Strategies and Equilibriums in Multimedia Fingerprinting Social Networks
Abstract—Multimedia social network is a network infrastructure in which the social network users share multimedia contents with all different purposes. Analyzing user behavior in...
W. Sabrina Lin, H. Vicky Zhao, K. J. Ray Liu
WWW
2011
ACM
13 years 2 months ago
Towards semantic knowledge propagation from text corpus to web images
In this paper, we study the problem of transfer learning from text to images in the context of network data in which link based bridges are available to transfer the knowledge bet...
Guojun Qi, Charu C. Aggarwal, Thomas Huang
EJASP
2010
116views more  EJASP 2010»
13 years 2 months ago
Data Fusion for Improved Respiration Rate Estimation
Abstract--We present an application of a modified KalmanFilter (KF) framework for data fusion to the estimation of respiratory rate from multiple physiological sources which is rob...
Shamim Nemati, Atul Malhotra, Gari D. Clifford
JOC
2010
123views more  JOC 2010»
13 years 2 months ago
Security Against Covert Adversaries: Efficient Protocols for Realistic Adversaries
Abstract. In the setting of secure multiparty computation, a set of mutually distrustful parties wish to securely compute some joint function of their private inputs. The computati...
Yonatan Aumann, Yehuda Lindell
« Prev « First page 2586 / 2597 Last » Next »