Sciweavers

10602 search results - page 28 / 2121
» Weakly Useful Sequences
Sort
View
IANDC
2006
77views more  IANDC 2006»
13 years 9 months ago
Weakly complete axiomatization of exogenous quantum propositional logic
A finitary axiomatization for EQPL (exogenous quantum propositional logic) is presented. The axiomatization is shown to be weakly complete relative to an oracle for analytical rea...
Paulo Mateus, Amílcar Sernadas
ISBI
2008
IEEE
14 years 9 months ago
Phase contrast image segmentation by weak watershed transform assembly
We present here a method giving a robust segmentation for in vitro cells observed under standard phase-contrast microscopy. We tackle the problem using the watershed transform. Wa...
Olivier Debeir, Ivan Adanja, Nadine Warzée,...
SP
2009
IEEE
14 years 3 months ago
Privacy Weaknesses in Biometric Sketches
The increasing use of biometrics has given rise to new privacy concerns. Biometric encryption systems have been proposed in order to alleviate such concerns: rather than comparing...
Koen Simoens, Pim Tuyls, Bart Preneel
DPD
2002
100views more  DPD 2002»
13 years 9 months ago
Light-Weight Currency Management Mechanisms in Mobile and Weakly-Connected Environments
This paper discusses the currency management mechanisms used in Deno, a replicated object storage system designed for use in mobile and weakly-connected environments. Deno primari...
Ugur Çetintemel, Peter J. Keleher
ICCV
2011
IEEE
12 years 9 months ago
Strong Supervision From Weak Annotation: Interactive Training of Deformable Part Models
We propose a framework for large scale learning and annotation of structured models. The system interleaves interactive labeling (where the current model is used to semiautomate t...
Steven Branson, Pietro Perona, Serge Belongie