Sciweavers

813 search results - page 65 / 163
» Pipeline-centric provenance model
Sort
View
ICPR
2006
IEEE
14 years 11 months ago
Onset Detection through Maximal Redundancy Detection
We propose a criterion, called `maximal redundancy', for onset detection in time series. The concept redundancy is adopted from information theory and indicates how well a si...
Gert Van Dijck, Marc M. Van Hulle
ICPR
2004
IEEE
14 years 11 months ago
Robust Carving for Non-Lambertian Objects
This paper presents a new surface reconstruction method that extends previous carving methods for non-Lambertian objects by integrating the smoothness and image information of dif...
Gang Zeng, Sylvain Paris, Long Quan
ICML
2009
IEEE
14 years 11 months ago
Online dictionary learning for sparse coding
Sparse coding--that is, modelling data vectors as sparse linear combinations of basis elements--is widely used in machine learning, neuroscience, signal processing, and statistics...
Julien Mairal, Francis Bach, Jean Ponce, Guillermo...
PKC
2009
Springer
115views Cryptology» more  PKC 2009»
14 years 10 months ago
Compact CCA-Secure Encryption for Messages of Arbitrary Length
This paper proposes a chosen-ciphertext secure variant of the ElGamal public-key encryption scheme which generates very compact ciphertexts for messages of arbitrary length. The ci...
Masayuki Abe, Eike Kiltz, Tatsuaki Okamoto
IEEEARES
2010
IEEE
14 years 5 months ago
Pitfalls in Formal Reasoning about Security Protocols
Formal verification can give more confidence in the security of cryptographic protocols. Application specific security properties like “The service provider does not loose mo...
Nina Moebius, Kurt Stenzel, Wolfgang Reif