Sciweavers

5634 search results - page 945 / 1127
» About Abstract Classes
Sort
View
ISVC
2010
Springer
15 years 2 months ago
Object Category Classification Using Occluding Contours
Abstract. Occluding contour (OC) plays important roles in many computer vision tasks. The study of using OC for visual inference tasks is however limited, partially due to the lack...
Jin Sun, Christopher Thorpe, Nianhua Xie, Jingyi Y...
219
Voted
MOBILIGHT
2010
15 years 2 months ago
A Framework for the Design Space Exploration of Software-Defined Radio Applications
Abstract. This paper describes a framework for the design space exploration of resource-efficient software-defined radio architectures. This design space exploration is based on a ...
Thorsten Jungeblut, Ralf Dreesen, Mario Porrmann, ...
PAIRING
2010
Springer
149views Cryptology» more  PAIRING 2010»
15 years 2 months ago
Constructing Certificateless Encryption and ID-Based Encryption from ID-Based Key Agreement
Abstract. We discuss the relationship between ID-based key agreement protocols, certificateless encryption and ID-based key encapsulation mechanisms. In particular we show how in s...
Dario Fiore, Rosario Gennaro, Nigel P. Smart
164
Voted
SEMWEB
2010
Springer
15 years 2 months ago
Linked Data Query Processing Strategies
Abstract. Recently, processing of queries on linked data has gained attention. We identify and systematically discuss three main strategies: a bottom-up strategy that discovers new...
Günter Ladwig, Thanh Tran
SEMWEB
2010
Springer
15 years 2 months ago
When owl: sameAs Isn't the Same: An Analysis of Identity in Linked Data
Abstract. In Linked Data, the use of owl:sameAs is ubiquitous in interlinking data-sets. There is however, ongoing discussion about its use, and potential misuse, particularly with...
Harry Halpin, Patrick J. Hayes, James P. McCusker,...