Sciweavers

11182 search results - page 2220 / 2237
» Shape Analysis of Sets
Sort
View
FAC
2010
121views more  FAC 2010»
13 years 6 months ago
Blaming the client: on data refinement in the presence of pointers
Data refinement is a common approach to reasoning about programs, based on establishing that te program indeed satisfies all the required properties imposed by an intended abstract...
Ivana Filipovic, Peter W. O'Hearn, Noah Torp-Smith...
CCS
2010
ACM
13 years 5 months ago
Practical leakage-resilient pseudorandom generators
Cryptographic systems and protocols are the core of many Internet security procedures (such as SSL, SSH, IPSEC, DNSSEC, secure mail, etc.). At the heart of all cryptographic funct...
Yu Yu, François-Xavier Standaert, Olivier P...

Publication
468views
13 years 5 months ago
Visual object tracking via sample-based Adaptive Sparse Representation (AdaSR)
When appearance variation of object and its background, partial occlusion or deterioration in object images occurs, most existing visual tracking methods tend to fail in tracking ...
Zhenjun Han, Jianbin Jiao, Baochang Zhang, Qixiang...
CVPR
2011
IEEE
13 years 6 months ago
Fast Unsupervised Ego-Action Learning for First-person Sports Videos
Portable high-quality sports cameras (e.g. head or helmet mounted) built for recording dynamic first-person video footage are becoming a common item among many sports enthusiasts...
Kris Kitani, Yoichi Sato, Takahiro Okabe, Akihiro ...
AOSD
2011
ACM
13 years 3 months ago
Experiences documenting and preserving software constraints using aspects
Software systems are increasingly being built as compositions of reusable artifacts (components, frameworks, toolkits, plug-ins, APIs, etc) that have non-trivial usage constraints...
Roberto Silveira Silva Filho, François Bron...
« Prev « First page 2220 / 2237 Last » Next »