Sciweavers

16430 search results - page 3136 / 3286
» On Computable Tree Functions
Sort
View
EUROPKI
2009
Springer
15 years 8 days ago
Automatic Generation of Sigma-Protocols
Efficient zero-knowledge proofs of knowledge (ZK-PoK) are basic building blocks of many cryptographic applications such as identification schemes, group signatures, and secure mult...
Endre Bangerter, Thomas Briner, Wilko Henecka, Ste...
139
Voted
GI
2009
Springer
15 years 8 days ago
The Differential Geometric View of Statistics and Estimation
: Statistics and estimation theory is enriched with techniques derived from differential geometry. This establishes the increasing topic of information geometry. This allows new in...
Felix Opitz
122
Voted
HIPC
2009
Springer
15 years 7 days ago
Detailed analysis of I/O traces for large scale applications
- In this paper, we present a tool to extract I/O traces from very large applications running at full scale during their production runs. We analyze these traces to gain informatio...
Nithin Nakka, Alok N. Choudhary, Wei-keng Liao, Le...
180
Voted
ICCV
2009
IEEE
15 years 7 days ago
Selection and context for action recognition
Recognizing human action in non-instrumented video is a challenging task not only because of the variability produced by general scene factors like illumination, background, occlu...
Dong Han, Liefeng Bo, Cristian Sminchisescu
ICCSA
2010
Springer
14 years 11 months ago
An Aspect-Oriented Approach for Mobile Embedded Software Modeling
Recently, it is one of the most challenging fields in software engineering for embedded software development, since the advancement of embedded technologies has made our life incre...
Yong-Yi Fanjiang, Jong-Yih Kuo, Shang-Pin Ma, Wong...
« Prev « First page 3136 / 3286 Last » Next »