Sciweavers

842 search results - page 95 / 169
» About the authors
Sort
View
TPHOL
2008
IEEE
15 years 7 months ago
A Type of Partial Recursive Functions
We describe a new method to represent (partial) recursive functions in type theory. For every recursive definition, we define a co-inductive type of prophecies that characterises...
Ana Bove, Venanzio Capretta
91
Voted
AVSS
2007
IEEE
15 years 7 months ago
Detection of abandoned objects in crowded environments
With concerns about terrorism and global security on the rise, it has become vital to have in place efficient threat detection systems that can detect and recognize potentially da...
Medha Bhargava, Chia-Chih Chen, Michael S. Ryoo, J...
118
Voted
ICDM
2007
IEEE
276views Data Mining» more  ICDM 2007»
15 years 7 months ago
SOPS: Stock Prediction Using Web Sentiment
Recently, the web has rapidly emerged as a great source of financial information ranging from news articles to personal opinions. Data mining and analysis of such financial info...
Vivek Sehgal, Charles Song
96
Voted
INFOCOM
2007
IEEE
15 years 7 months ago
Scalable Secure Bidirectional Group Communication
— Many network applications are based on a group communications model where one party sends messages to a large number of authorized recipients and/or receives messages from mult...
Yitao Duan, John F. Canny
95
Voted
ICDIM
2007
IEEE
15 years 6 months ago
Proposed secure mechanism for identification of ownership of undressed photographs or movies captured using camera based mobile
: Cameras attached to mobile phones are becoming more and more common, and as we move towards 3G and Next Generation Networks, it has become more a standard feature of mobile phone...
Samir B. Patel