Sciweavers

1441 search results - page 185 / 289
» Multiple instance ranking
Sort
View
ESORICS
2011
Springer
12 years 9 months ago
Remote Timing Attacks Are Still Practical
For over two decades, timing attacks have been an active area of research within applied cryptography. These attacks exploit cryptosystem or protocol implementations that do not ru...
Billy Bob Brumley, Nicola Tuveri
TOG
2012
265views Communications» more  TOG 2012»
12 years 13 days ago
Tailored displays to compensate for visual aberrations
We introduce tailored displays that enhance visual acuity by decomposing virtual objects and placing the resulting anisotropic pieces into the subject’s focal range. The goal is...
Vitor F. Pamplona, Manuel M. Oliveira, Daniel G. A...
CVPR
2012
IEEE
12 years 13 days ago
Multi-class cosegmentation
Bottom-up, fully unsupervised segmentation remains a daunting challenge for computer vision. In the cosegmentation context, on the other hand, the availability of multiple images ...
Armand Joulin, Francis Bach, Jean Ponce
WWW
2008
ACM
14 years 10 months ago
Mining, indexing, and searching for textual chemical molecule information on the web
Current search engines do not support user searches for chemical entities (chemical names and formulae) beyond simple keyword searches. Usually a chemical molecule can be represen...
Bingjun Sun, Prasenjit Mitra, C. Lee Giles
WWW
2007
ACM
14 years 10 months ago
Web object retrieval
The primary function of current Web search engines is essentially relevance ranking at the document level. However, myriad structured information about real-world objects is embed...
Zaiqing Nie, Yunxiao Ma, Shuming Shi, Ji-Rong Wen,...