Sciweavers

742 search results - page 84 / 149
» Validating an Online Adaptive System Using SVDD
Sort
View
110
Voted
ASIACRYPT
2007
Springer
15 years 9 months ago
Miniature CCA2 PK Encryption: Tight Security Without Redundancy
ersion of an extended abstract to be published in Advances in Cryptology—ASIACRYPT 2007, Springer-Verlag, 2007. Available online from: http://www.cs.stanford.edu/∼xb/asiacrypt0...
Xavier Boyen
115
Voted
HICSS
2003
IEEE
126views Biometrics» more  HICSS 2003»
15 years 9 months ago
E-Services in the Internet Job Market
In today’s rapidly changing workplace, it’s becoming more and more difficult for recruiters to find employees that are right for their business. Consideration of cultural fit,...
Georgios A. Dafoulas, Athanasios N. Nikolaou, Mike...
122
Voted
ICANN
1997
Springer
15 years 7 months ago
Local Subspace Classifier
Subsystems for on-line recognition of handwriting are needed in personal digital assistants (PDAs) and other portable handheld devices. We have developed a recognition system whic...
Jorma Laaksonen
137
Voted
TCOM
2010
106views more  TCOM 2010»
15 years 2 months ago
On the system level prediction of joint time frequency spreading systems with carrier phase noise
- Phase noise is a topic of theoretical and practical interest in electronic circuits. Although progress has been made in the characterization of its description, there are still c...
Youssef Nasser, Mathieu Des Noes, Laurent Ros, Gen...
138
Voted
ICIP
2003
IEEE
15 years 9 months ago
Perceptual regularization functionals for natural image restoration
Regularization constraints are necessary in inverse problems such as image restoration, optical flow computation or shape from shading to avoid the singularities in the solution....
Juan Gutierrez, Jesus Malo, Francesc J. Ferri