Sciweavers

1940 search results - page 368 / 388
» Optimizing search engines using clickthrough data
Sort
View
EWC
2011
98views more  EWC 2011»
13 years 3 months ago
Real-time triangulation of point streams
Hand-held laser scanners are commonly used in industry for reverse engineering and quality measurements. In this process, it is difficult for the human operator to scan the target...
Klaus Denker, Burkhard Lehner, Georg Umlauf
NSPW
2003
ACM
14 years 2 months ago
SELF: a transparent security extension for ELF binaries
The ability to analyze and modify binaries is often very useful from a security viewpoint. Security operations one would like to perform on binaries include the ability to extract...
Daniel C. DuVarney, V. N. Venkatakrishnan, Sandeep...
TC
2010
13 years 3 months ago
Reconfigurable Hardware Implementations of Tweakable Enciphering Schemes
Tweakable enciphering schemes are length preserving block cipher modes of operation that provide a strong pseudo-random permutation. It has been suggested that these schemes can b...
Cuauhtemoc Mancillas-López, Debrup Chakrabo...
KDD
2010
ACM
199views Data Mining» more  KDD 2010»
14 years 21 days ago
Overlapping experiment infrastructure: more, better, faster experimentation
At Google, experimentation is practically a mantra; we evaluate almost every change that potentially affects what our users experience. Such changes include not only obvious user-...
Diane Tang, Ashish Agarwal, Deirdre O'Brien, Mike ...
CVPR
2007
IEEE
14 years 10 months ago
Detailed Human Shape and Pose from Images
Much of the research on video-based human motion capture assumes the body shape is known a priori and is represented coarsely (e.g. using cylinders or superquadrics to model limbs...
Alexandru O. Balan, Leonid Sigal, Michael J. Black...