Sciweavers

813 search results - page 33 / 163
» Pipeline-centric provenance model
Sort
View
IPMI
2005
Springer
14 years 8 months ago
Multi-object Segmentation Using Shape Particles
Deformable template models, in which a shape model and its corresponding appearance model are deformed to optimally fit an object in the image, have proven successful in many medic...
Marleen de Bruijne, Mads Nielsen
CTRSA
2010
Springer
200views Cryptology» more  CTRSA 2010»
14 years 2 months ago
Resettable Public-Key Encryption: How to Encrypt on a Virtual Machine
Typical security models used for proving security of deployed cryptographic primitives do not allow adversaries to rewind or reset honest parties to an earlier state. Thus, it is c...
Scott Yilek
ICASSP
2008
IEEE
14 years 2 months ago
A covariance kernel for SVM language recognition
Discriminative training for language recognition has been a key tool for improving system performance. In addition, recognition directly from shifted-delta cepstral features has p...
William M. Campbell
COMPSAC
2007
IEEE
14 years 2 months ago
A model-driven framework for representing and applying design patterns
Design patterns encode proven solutions to recurring design problems. To use a design pattern properly, we need to 1) understand the design problem the pattern resolves, 2) recogn...
Ghizlane El-Boussaidi, Hafedh Mili
DSN
2006
IEEE
14 years 1 months ago
Dynamic Verification of Memory Consistency in Cache-Coherent Multithreaded Computer Architectures
—Multithreaded servers with cache-coherent shared memory are the dominant type of machines used to run critical network services and database management systems. To achieve the h...
Albert Meixner, Daniel J. Sorin