Sciweavers

3732 search results - page 737 / 747
» Ubiquitous Computing for the Public
Sort
View
TROB
2008
154views more  TROB 2008»
13 years 5 months ago
Large-Scale SLAM Building Conditionally Independent Local Maps: Application to Monocular Vision
SLAM algorithms based on local maps have been demonstrated to be well suited for mapping large environments as they reduce the computational cost and improve the consistency of the...
Pedro Pinies, Juan D. Tardós
NECO
2010
154views more  NECO 2010»
13 years 5 months ago
Role of Homeostasis in Learning Sparse Representations
Neurons in the input layer of primary visual cortex in primates develop edge-like receptive fields. One approach to understanding the emergence of this response is to state that ...
Laurent U. Perrinet
SCN
2010
Springer
144views Communications» more  SCN 2010»
13 years 5 months ago
Generic Constructions of Parallel Key-Insulated Encryption
Exposure of a secret key is a significant threat in practice. As a notion of security against key exposure, Dodis et al. advocated key-insulated security, and proposed concrete k...
Goichiro Hanaoka, Jian Weng
TMI
2010
172views more  TMI 2010»
13 years 5 months ago
Comparison of AdaBoost and Support Vector Machines for Detecting Alzheimer's Disease Through Automated Hippocampal Segmentation
Abstract— We compared four automated methods for hippocampal segmentation using different machine learning algorithms (1) hierarchical AdaBoost, (2) Support Vector Machines (SVM)...
Jonathan H. Morra, Zhuowen Tu, Liana G. Apostolova...
ASIACRYPT
2010
Springer
13 years 4 months ago
A Closer Look at Anonymity and Robustness in Encryption Schemes
Abstract. In this work, we take a closer look at anonymity and robustness in encryption schemes. Roughly speaking, an anonymous encryption scheme hides the identity of the secret-k...
Payman Mohassel