Sciweavers

813 search results - page 53 / 163
» Pipeline-centric provenance model
Sort
View
JCNS
2010
104views more  JCNS 2010»
13 years 8 months ago
A new look at state-space models for neural data
State space methods have proven indispensable in neural data analysis. However, common methods for performing inference in state-space models with non-Gaussian observations rely o...
Liam Paninski, Yashar Ahmadian, Daniel Gil Ferreir...
ICCV
2009
IEEE
1318views Computer Vision» more  ICCV 2009»
15 years 3 months ago
Non-Local Sparse Models for Image Restoration
We propose in this paper to unify two different ap- proaches to image restoration: On the one hand, learning a basis set (dictionary) adapted to sparse signal descriptions has p...
Julien Mairal, Francis Bach, Jean Ponce, Guillermo...
ICLP
2009
Springer
14 years 4 months ago
An Engine for Computing Well-Founded Models
The seemingly simple choice of whether to use call variance or call subsumption in a tabled evaluation deeply affects an evaluation’s properties. Most tabling implementations hav...
Terrance Swift
SDL
2007
139views Hardware» more  SDL 2007»
13 years 11 months ago
A Model-Based Standard for SDL
Abstract. It is still the case that language descriptions have lots of semantic information captured using plain (English) text. These imprecise descriptions are hardly usable for ...
Andreas Prinz, Markus Scheidgen, Merete Skjelten T...
CCS
2010
ACM
13 years 6 months ago
Practical leakage-resilient pseudorandom generators
Cryptographic systems and protocols are the core of many Internet security procedures (such as SSL, SSH, IPSEC, DNSSEC, secure mail, etc.). At the heart of all cryptographic funct...
Yu Yu, François-Xavier Standaert, Olivier P...