Sciweavers

7296 search results - page 1339 / 1460
» informs 2010
Sort
View
179
Voted
CIVR
2010
Springer
246views Image Analysis» more  CIVR 2010»
15 years 2 months ago
Genre-specific semantic video indexing
In many applications, we find large video collections from different genres where the user is often only interested in one or two specific video genres. So, when users are queryin...
Jun Wu, Marcel Worring
173
Voted
CODES
2010
IEEE
15 years 2 months ago
A task remapping technique for reliable multi-core embedded systems
With the continuous scaling of semiconductor technology, the life-time of circuit is decreasing so that processor failure becomes an important issue in MPSoC design. A software so...
Chanhee Lee, Hokeun Kim, Hae-woo Park, Sungchan Ki...
138
Voted
EMNLP
2010
15 years 2 months ago
What a Parser Can Learn from a Semantic Role Labeler and Vice Versa
In many NLP systems, there is a unidirectional flow of information in which a parser supplies input to a semantic role labeler. In this paper, we build a system that allows inform...
Stephen A. Boxwell, Dennis Mehay, Chris Brew
FDTC
2010
Springer
132views Cryptology» more  FDTC 2010»
15 years 2 months ago
Fault Injection Resilience
Fault injections constitute a major threat to the security of embedded systems. The errors in the cryptographic algorithms have been shown to be extremely dangerous, since powerful...
Sylvain Guilley, Laurent Sauvage, Jean-Luc Danger,...
GLOBECOM
2010
IEEE
15 years 2 months ago
Selective Cross Correlation in Passive Timing Analysis Attacks against Low-Latency Mixes
A mix is a communication proxy that hides the relationship between incoming and outgoing messages. Routing traffic through a path of mixes is a powerful tool for providing privacy....
Titus Abraham, Matthew Wright
« Prev « First page 1339 / 1460 Last » Next »