Sciweavers

811 search results - page 107 / 163
» When Novelty Is Not Enough
Sort
View
CORR
2010
Springer
225views Education» more  CORR 2010»
13 years 8 months ago
Analysis of the Security of BB84 by Model Checking
Quantum Cryptography or Quantum key distribution (QKD) is a technique that allows the secure distribution of a bit string, used as key in cryptographic protocols. When it was note...
Mohamed Elboukhari, Mostafa Azizi, Abdelmalek Aziz...
IVC
2007
97views more  IVC 2007»
13 years 8 months ago
Stochastic exploration and active learning for image retrieval
This paper deals with content-based image retrieval. When the user is looking for large categories, statistical classification techniques are efficient as soon as the training se...
Matthieu Cord, Philippe Henri Gosselin, Sylvie Phi...
SIGMOD
2008
ACM
129views Database» more  SIGMOD 2008»
13 years 8 months ago
TerraServer and the Russia adventure..
Jim Gray made many friends and few enemies in his career. Many of the projects he worked on were inspired by one or more of his friends and collaborators in industry and academia....
Tom Barclay
ICRA
2010
IEEE
151views Robotics» more  ICRA 2010»
13 years 7 months ago
Trajectory prediction in cluttered voxel environments
Abstract— Trajectory planning and optimization is a fundamental problem in articulated robotics. It is often viewed as a two phase problem of initial feasible path planning aroun...
Nikolay Jetchev, Marc Toussaint
JUCS
2010
104views more  JUCS 2010»
13 years 7 months ago
Investigating a Correlation between Subcellular Localization and Fold of Proteins
: When considering the prediction of a structural class for a protein as a classification problem, usually a classifier is based on a feature vector x ∈ Rn , where the features...
Johannes Aßfalg, Jing Gong, Hans-Peter Krieg...