Sciweavers

406 search results - page 38 / 82
» The Computation and Application of the Generalized Inverse v...
Sort
View
CCS
2008
ACM
13 years 10 months ago
Privacy oracle: a system for finding application leaks with black box differential testing
We describe the design and implementation of Privacy Oracle, a system that reports on application leaks of user information via the network traffic that they send. Privacy Oracle ...
Jaeyeon Jung, Anmol Sheth, Ben Greenstein, David W...
CVPR
2008
IEEE
14 years 10 months ago
Non-negative graph embedding
We introduce a general formulation, called non-negative graph embedding, for non-negative data decomposition by integrating the characteristics of both intrinsic and penalty graph...
Jianchao Yang, Shuicheng Yan, Yun Fu, Xuelong Li, ...
CVPR
2008
IEEE
14 years 10 months ago
Image decomposition into structure and texture subcomponents with multifrequency modulation constraints
Texture information in images is coupled with geometric macrostructures and piecewise-smooth intensity variations. Decomposing an image f into a geometric structure component u an...
Georgios Evangelopoulos, Petros Maragos
IWCMC
2006
ACM
14 years 2 months ago
Performance enhancing proxy for interactive 3G network gaming
Unlike non-time-critical applications like email and file transfer, network games demand timely data delivery to maintain the seemingly interactive presence of players in the vir...
Gene Cheung, Takashi Sakamoto, Michael Sweeney
SAS
1999
Springer
116views Formal Methods» more  SAS 1999»
14 years 1 months ago
Decomposing Non-redundant Sharing by Complementation
Complementation, the inverse of the reduced product operation, is a technique for systemfinding minimal decompositions of abstract domains. Fil´e and Ranzato advanced the state ...
Enea Zaffanella, Patricia M. Hill, Roberto Bagnara