Sciweavers

10602 search results - page 36 / 2121
» Weakly Useful Sequences
Sort
View
CSL
2010
Springer
13 years 10 months ago
New Algorithm for Weak Monadic Second-Order Logic on Inductive Structures
We present a new algorithm for model-checking weak monadic second-order logic on inductive structures, a class of structures of bounded clique width. Our algorithm directly manipul...
Tobias Ganzow, Lukasz Kaiser
JCSS
2002
86views more  JCSS 2002»
13 years 8 months ago
A New Proof of the Weak Pigeonhole Principle
The exact complexity of the weak pigeonhole principle is an old and fundamental problem in proof complexity. Using a diagonalization argument, Paris, Wilkieand Woods 16] showed ho...
Alexis Maciel, Toniann Pitassi, Alan R. Woods
ICCV
2009
IEEE
15 years 2 months ago
Weakly supervised discriminative localization and classification: a joint learning process
Visual categorization problems, such as object classification or action recognition, are increasingly often approached using a detection strategy: a classifier function is first ...
Minh Hoai Nguyen, Lorenzo Torresani, Fernando de l...
ICCV
2007
IEEE
14 years 11 months ago
Classification of Weakly-Labeled Data with Partial Equivalence Relations
In many vision problems, instead of having fully labeled training data, it is easier to obtain the input in small groups, where the data in each group is constrained to be from th...
Sanjiv Kumar, Henry A. Rowley
FC
2005
Springer
98views Cryptology» more  FC 2005»
14 years 2 months ago
Secure Biometric Authentication for Weak Computational Devices
This paper presents computationally “lightweight” schemes for performing biometric authentication that carry out the comparison stage without revealing any information that can...
Mikhail J. Atallah, Keith B. Frikken, Michael T. G...