Sciweavers

298 search results - page 34 / 60
» Abstract Models of Transfinite Reductions
Sort
View
69
Voted
ASIACRYPT
2007
Springer
15 years 4 months ago
Miniature CCA2 PK Encryption: Tight Security Without Redundancy
ersion of an extended abstract to be published in Advances in Cryptology—ASIACRYPT 2007, Springer-Verlag, 2007. Available online from: http://www.cs.stanford.edu/∼xb/asiacrypt0...
Xavier Boyen
FORMATS
2010
Springer
14 years 8 months ago
Layered Composition for Timed Automata
Abstract. We investigate layered composition for real-time systems modelled as (networks of) timed automata (TA). We first formulate the principles of layering and transition indep...
Ernst-Rüdiger Olderog, Mani Swaminathan
86
Voted
TASLP
2010
82views more  TASLP 2010»
14 years 4 months ago
Psychoacoustically Constrained and Distortion Minimized Speech Enhancement
Abstract--This paper considers a psychoacoustically constrained and distortion minimized speech enhancement algorithm. Noise reduction, in general, leads to speech distortion, and ...
Seokhwan Jo, Chang D. Yoo
ECCV
2004
Springer
16 years 1 days ago
Transformation-Invariant Embedding for Image Analysis
Abstract. Dimensionality reduction is an essential aspect of visual processing. Traditionally, linear dimensionality reduction techniques such as principle components analysis have...
Ali Ghodsi, Jiayuan Huang, Dale Schuurmans
79
Voted
MM
2010
ACM
146views Multimedia» more  MM 2010»
14 years 10 months ago
Making computers look the way we look: exploiting visual attention for image understanding
Human Visual attention (HVA) is an important strategy to focus on specific information while observing and understanding visual stimuli. HVA involves making a series of fixations ...
Harish Katti, Subramanian Ramanathan, Mohan S. Kan...