Sciweavers

4762 search results - page 751 / 953
» About the use of protein models
Sort
View
PST
2004
15 years 2 months ago
Determining Internet Users' Values for Private Information
We examine the problem of determining a user's value for his/her private information. Web businesses often offer rewards, such as discounts, free downloads and website persona...
Scott Buffett, Nathan Scott, Bruce Spencer, Michae...
AAAI
1997
15 years 2 months ago
The "Inverse Hollywood Problem": From Video to Scripts and Storyboards via Causal Analysis
We address the problem of visually detecting causal events and tting them together into a coherent story of the action witnessed by the camera. We show that this can be done by re...
Matthew Brand
CRYPTO
2010
Springer
201views Cryptology» more  CRYPTO 2010»
15 years 2 months ago
Protecting Cryptographic Keys against Continual Leakage
Side-channel attacks have often proven to have a devastating effect on the security of cryptographic schemes. In this paper, we address the problem of storing cryptographic keys a...
Ali Juma, Yevgeniy Vahlis
109
Voted
AAAI
2010
15 years 1 months ago
The Boosting Effect of Exploratory Behaviors
Active object exploration is one of the hallmarks of human and animal intelligence. Research in psychology has shown that the use of multiple exploratory behaviors is crucial for ...
Jivko Sinapov, Alexander Stoytchev
ICASSP
2010
IEEE
15 years 1 months ago
Forensic estimation and reconstruction of a contrast enhancement mapping
Due to the ease with which convincing digital image forgeries can be created, a need has arisen for digital forensic techniques capable of detecting image manipulation. Once image...
Matthew C. Stamm, K. J. Ray Liu