Sciweavers

2483 search results - page 442 / 497
» A design framework to model retinas
Sort
View
FDTC
2006
Springer
102views Cryptology» more  FDTC 2006»
15 years 1 months ago
Cryptographic Key Reliable Lifetimes: Bounding the Risk of Key Exposure in the Presence of Faults
With physical attacks threatening the security of current cryptographic schemes, no security policy can be developed without taking into account the physical nature of computation....
Alfonso De Gregorio
ECCV
2008
Springer
14 years 11 months ago
Multiple Instance Boost Using Graph Embedding Based Decision Stump for Pedestrian Detection
Pedestrian detection in still image should handle the large appearance and stance variations arising from the articulated structure, various clothing of human as well as viewpoints...
Junbiao Pang, Qingming Huang, Shuqiang Jiang
FMCO
2008
Springer
133views Formal Methods» more  FMCO 2008»
14 years 11 months ago
BML and Related Tools
The Bytecode Modeling Language (BML) is a specication for Java bytecode, that provides a high level of abstraction, while not restricting the format of the bytecode. Notably, BML s...
Jacek Chrzaszcz, Marieke Huisman, Aleksy Schubert
DAIS
2010
14 years 11 months ago
Structured Context Prediction: A Generic Approach
Context-aware applications and middleware platforms are evolving into major driving factors for pervasive systems. The ability to also make accurate assumptions about future contex...
Matthias Meiners, Sonja Zaplata, Winfried Lamersdo...
LREC
2010
188views Education» more  LREC 2010»
14 years 11 months ago
Example-Based Automatic Phonetic Transcription
Current state-of-the-art systems for automatic phonetic transcription (APT) are mostly phone recognizers based on Hidden Markov models (HMMs). We present a different approach for ...
Christina Leitner, Martin Schickbichler, Stefan Pe...