Sciweavers

773 search results - page 127 / 155
» On Cryptographic Assumptions and Challenges
Sort
View
ENTCS
2007
131views more  ENTCS 2007»
13 years 9 months ago
Secure Node Discovery in Ad-hoc Networks and Applications
Designing secure protocols over ad-hoc networks has proved to be a very challenging task, due to various features of such networks, such as partial connectivity, node mobility, an...
Giovanni Di Crescenzo
MTA
2008
146views more  MTA 2008»
13 years 9 months ago
A survey of browsing models for content based image retrieval
The problem of content based image retrieval (CBIR) has traditionally been investigated within a framework that emphasises the explicit formulation of a query: users initiate an au...
Daniel Heesch
TCAD
2008
88views more  TCAD 2008»
13 years 9 months ago
Self-Adaptive Data Caches for Soft-Error Reliability
Soft-error induced reliability problems have become a major challenge in designing new generation microprocessors. Due to the on-chip caches' dominant share in die area and tr...
Shuai Wang, Jie S. Hu, Sotirios G. Ziavras
IJCV
2002
133views more  IJCV 2002»
13 years 9 months ago
Probabilistic Tracking with Exemplars in a Metric Space
Abstract. A new, exemplar-based, probabilistic paradigm for visual tracking is presented. Probabilistic mechanisms are attractive because they handle fusion of information, especia...
Kentaro Toyama, Andrew Blake
NECO
2002
145views more  NECO 2002»
13 years 9 months ago
Bayesian Model Assessment and Comparison Using Cross-Validation Predictive Densities
In this work, we discuss practical methods for the assessment, comparison, and selection of complex hierarchical Bayesian models. A natural way to assess the goodness of the model...
Aki Vehtari, Jouko Lampinen