Sciweavers

298 search results - page 34 / 60
» Abstract Models of Transfinite Reductions
Sort
View
ASIACRYPT
2007
Springer
15 years 6 months ago
Miniature CCA2 PK Encryption: Tight Security Without Redundancy
ersion of an extended abstract to be published in Advances in Cryptology—ASIACRYPT 2007, Springer-Verlag, 2007. Available online from: http://www.cs.stanford.edu/∼xb/asiacrypt0...
Xavier Boyen
FORMATS
2010
Springer
14 years 9 months ago
Layered Composition for Timed Automata
Abstract. We investigate layered composition for real-time systems modelled as (networks of) timed automata (TA). We first formulate the principles of layering and transition indep...
Ernst-Rüdiger Olderog, Mani Swaminathan
TASLP
2010
82views more  TASLP 2010»
14 years 6 months ago
Psychoacoustically Constrained and Distortion Minimized Speech Enhancement
Abstract--This paper considers a psychoacoustically constrained and distortion minimized speech enhancement algorithm. Noise reduction, in general, leads to speech distortion, and ...
Seokhwan Jo, Chang D. Yoo
ECCV
2004
Springer
16 years 1 months ago
Transformation-Invariant Embedding for Image Analysis
Abstract. Dimensionality reduction is an essential aspect of visual processing. Traditionally, linear dimensionality reduction techniques such as principle components analysis have...
Ali Ghodsi, Jiayuan Huang, Dale Schuurmans
MM
2010
ACM
146views Multimedia» more  MM 2010»
14 years 12 months ago
Making computers look the way we look: exploiting visual attention for image understanding
Human Visual attention (HVA) is an important strategy to focus on specific information while observing and understanding visual stimuli. HVA involves making a series of fixations ...
Harish Katti, Subramanian Ramanathan, Mohan S. Kan...