Sciweavers

3318 search results - page 112 / 664
» The Weak Instance Model
Sort
View
ICPR
2010
IEEE
14 years 1 months ago
Discriminative Level Set for Contour Tracking
Conventional contour tracking algorithms with level set often use generative models to construct the energy function. For tracking through cluttered and noisy background, however,...
Wei Li
DRM
2008
Springer
13 years 9 months ago
RSA-TBOS signcryption with proxy re-encryption
The recent attack on Apple iTunes Digital Rights Management [17] has brought to light the usefulness of proxy re-encryption schemes for Digital Rights Management. It is known that...
Varad Kirtane, C. Pandu Rangan
NC
2010
179views Neural Networks» more  NC 2010»
13 years 6 months ago
Representation before computation
My main objective is to point out a fundamental weakness in the conventional conception of computation and suggest a promising way out. This weakness is directly related to a gross...
Lev Goldfarb
ICT
2004
Springer
105views Communications» more  ICT 2004»
14 years 1 months ago
UML Specification of a Generic Model for Fault Diagnosis of Telecommunication Networks
: this document presents a generic model capturing the essential structural and behavioral characteristics of network components in the light of fault management. The generic model...
Armen Aghasaryan, Claude Jard, Julien Thomas
JACIII
2007
79views more  JACIII 2007»
13 years 8 months ago
State-Transition Computation Models and Program Correctness Thereon
Abstract— A common framework for formalization of statetransition computation models is presented based on a general theory for studying the interrelationships between specifica...
Kiyoshi Akama, Ekawit Nantajeewarawat