Sciweavers

10602 search results - page 74 / 2121
» Weakly Useful Sequences
Sort
View
WSS
2001
110views Control Systems» more  WSS 2001»
13 years 10 months ago
On the Security and Vulnerability of PING
We present a formal specification of the PING protocol, and use three concepts of convergence theory, namely closure, convergence, and protection, to show that this protocol is se...
Mohamed G. Gouda, Chin-Tser Huang, Anish Arora
ICPADS
2005
IEEE
14 years 2 months ago
Exploiting Multi-level Parallelism for Homology Search using General Purpose Processors
New biological experimental techniques are continuing to generate large amounts of data using DNA, RNA, human genome and protein sequences. The quantity and quality of data from t...
Xiandong Meng, Vipin Chaudhary
ECCV
2008
Springer
14 years 11 months ago
Cross-View Action Recognition from Temporal Self-similarities
This paper concerns recognition of human actions under view changes. We explore self-similarities of action sequences over time and observe the striking stability of such measures ...
Imran N. Junejo, Emilie Dexter, Ivan Laptev, Patri...
LISP
2007
74views more  LISP 2007»
13 years 9 months ago
Improving the lazy Krivine machine
Krivine presents the K machine, which produces weak head normal form results. Sestoft introduces several call-by-need variants of the K machine that implement result sharing via pu...
Daniel P. Friedman, Abdulaziz Ghuloum, Jeremy G. S...
PAMI
2011
13 years 4 months ago
View-Independent Action Recognition from Temporal Self-Similarities
— This paper addresses recognition of human actions under view changes. We explore self-similarities of action sequences over time and observe the striking stability of such meas...
Imran N. Junejo, Emilie Dexter, Ivan Laptev, Patri...