Sciweavers

55 search results - page 8 / 11
» Weak Kernels
Sort
View
WISA
2004
Springer
14 years 24 days ago
Encrypted Watermarks and Linux Laptop Security
The most common way to implement full-disk encryption (as opposed to encrypted file systems) in the GNU/Linux operating system is using the encrypted loop device, known as CryptoL...
Markku-Juhani Olavi Saarinen
ISTA
2004
13 years 8 months ago
TransM: A Structured Document Transformation Model
: We present in this paper a transformation model for structured documents. TransM is a new model that deals with specified documents, where the structure conforms to a predefined ...
Nouhad Amaneddine, Jean Paul Bahsoun, Jean-Paul Bo...
CIMAGING
2009
265views Hardware» more  CIMAGING 2009»
13 years 8 months ago
Multi-object segmentation using coupled nonparametric shape and relative pose priors
We present a new method for multi-object segmentation in a maximum a posteriori estimation framework. Our method is motivated by the observation that neighboring or coupling objec...
Mustafa Gökhan Uzunbas, Octavian Soldea, M&uu...
CORR
2010
Springer
95views Education» more  CORR 2010»
13 years 7 months ago
Optimization and Convergence of Observation Channels in Stochastic Control
This paper studies the optimization of observation channels (stochastic kernels) in partially observed stochastic control problems. In particular, existence, continuity, and convex...
Serdar Yüksel, Tamás Linder
JOLLI
2002
74views more  JOLLI 2002»
13 years 7 months ago
Referent Systems and Relational Grammar
Abstract. Relational Grammar (RG) was introduced in the 70's as a theory of grammatical relations and relation change, for example, passivization, dative shift, and raising. F...
Marcus Kracht