Sciweavers

20573 search results - page 3819 / 4115
» The Computer's New Clothes
Sort
View
CTRSA
2010
Springer
191views Cryptology» more  CTRSA 2010»
15 years 8 months ago
Making the Diffie-Hellman Protocol Identity-Based
This paper presents a new identity based key agreement protocol. In id-based cryptography (introduced by Adi Shamir in [33]) each party uses its own identity as public key and rece...
Dario Fiore, Rosario Gennaro
172
Voted
DAC
2010
ACM
15 years 8 months ago
Scalable specification mining for verification and diagnosis
Effective system verification requires good specifications. The lack of sufficient specifications can lead to misses of critical bugs, design re-spins, and time-to-market slips. I...
Wenchao Li, Alessandro Forin, Sanjit A. Seshia
178
Voted
CVPR
2010
IEEE
15 years 8 months ago
Classification and Clustering via Dictionary Learning with Structured Incoherence
A clustering framework within the sparse modeling and dictionary learning setting is introduced in this work. Instead of searching for the set of centroid that best fit the data, ...
Pablo Sprechmann, Ignacio Ramirez, Guillermo Sapir...
161
Voted
ECCV
2010
Springer
15 years 7 months ago
Depth-Encoded Hough Voting for joint object detection and shape recovery
Detecting objects, estimating their pose and recovering 3D shape information is a critical problem in many vision and robotics applications. This paper addresses the above needs by...
142
Voted
FAST
2008
15 years 7 months ago
Improving I/O Performance of Applications through Compiler-Directed Code Restructuring
Ever-increasing complexity of large-scale applications and continuous increases in sizes of the data they process make the problem of maximizing performance of such applications a...
Mahmut T. Kandemir, Seung Woo Son, Mustafa Karak&o...
« Prev « First page 3819 / 4115 Last » Next »