Sciweavers

8903 search results - page 1753 / 1781
» Alternative
Sort
View
SIAMCOMP
2011
14 years 4 months ago
Black-Box Constructions of Protocols for Secure Computation
In this paper, we study the question of whether or not it is possible to construct protocols for general secure computation in the setting of malicious adversaries and no honest m...
Iftach Haitner, Yuval Ishai, Eyal Kushilevitz, Yeh...
SIAMIS
2011
14 years 4 months ago
NESTA: A Fast and Accurate First-Order Method for Sparse Recovery
Abstract. Accurate signal recovery or image reconstruction from indirect and possibly undersampled data is a topic of considerable interest; for example, the literature in the rece...
Stephen Becker, Jérôme Bobin, Emmanue...
SYNTHESE
2011
88views more  SYNTHESE 2011»
14 years 4 months ago
Saving the intuitions: polylithic reference
: My main aim in this paper is to clarify the concepts of referential success and of referential continuity that are so crucial to the scientific realism debate. I start by conside...
Ioannis Votsis
TASE
2011
IEEE
14 years 4 months ago
Multiclass Flow Line Models of Semiconductor Manufacturing Equipment for Fab-Level Simulation
—For multiclass flow line models, we identify a class of service times that allow a decomposition of the system into subsets of servers called channels. In each channel, the cus...
James R. Morrison
TASLP
2011
14 years 4 months ago
A Probabilistic Interaction Model for Multipitch Tracking With Factorial Hidden Markov Models
—We present a simple and efficient feature modeling approach for tracking the pitch of two simultaneously active speakers. We model the spectrogram features of single speakers u...
Michael Wohlmayr, Michael Stark, Franz Pernkopf
« Prev « First page 1753 / 1781 Last » Next »