Sciweavers

15614 search results - page 3085 / 3123
» The State of State
Sort
View
155
Voted
CCS
2010
ACM
15 years 13 days ago
Practical leakage-resilient pseudorandom generators
Cryptographic systems and protocols are the core of many Internet security procedures (such as SSL, SSH, IPSEC, DNSSEC, secure mail, etc.). At the heart of all cryptographic funct...
Yu Yu, François-Xavier Standaert, Olivier P...
150
Voted
CVPR
2011
IEEE
15 years 13 days ago
Natural Image Denoising: Optimality and Inherent Bounds
The goal of natural image denoising is to estimate a clean version of a given noisy image, utilizing prior knowledge on the statistics of natural images. The problem has been stud...
Anat Levin, Boaz Nadler
183
Voted
CVPR
2011
IEEE
14 years 11 months ago
action recognition by dense trajectories
Feature trajectories have shown to be efficient for representing videos. Typically, they are extracted using the KLT tracker or matching SIFT descriptors between frames. However,...
Heng Wang, Alexander Kläser, Cordelia Schmid, Che...
145
Voted
CVPR
2011
IEEE
14 years 11 months ago
Unbiased Look at Dataset Bias
Datasets are an integral part of contemporary object recognition research. They have been the chief reason for the considerable progress in the field, not just as source of large...
Antonio Torralba, Alyosha Efros
160
Voted
AI
2011
Springer
14 years 10 months ago
Bounded approximate decentralised coordination via the max-sum algorithm
In this paper we propose a novel approach to decentralised coordination, that is able to efficiently compute solutions with a guaranteed approximation ratio. Our approach is base...
Alex Rogers, Alessandro Farinelli, Ruben Stranders...
« Prev « First page 3085 / 3123 Last » Next »