Sciweavers

10414 search results - page 1885 / 2083
» An efficient algorithm for Co-segmentation
Sort
View
99
Voted
SIAMMAX
2010
104views more  SIAMMAX 2010»
14 years 10 months ago
Rigorous Perturbation Bounds of Some Matrix Factorizations
This article presents rigorous normwise perturbation bounds for the Cholesky, LU and QR factorizations with normwise or componentwise perturbations in the given matrix. The conside...
Xiao-Wen Chang, Damien Stehlé
SPIC
2010
14 years 10 months ago
Attention-based video streaming
This paper presents a complete framework for attention-based video streaming for low bandwidth networks. First, motivated by the fovea-periphery distinction of biological vision s...
Çagatay Dikici, H. Isil Bozma
126
Voted
TCIAIG
2010
14 years 10 months ago
The Parametrized Probabilistic Finite-State Transducer Probe Game Player Fingerprint Model
Abstract--Fingerprinting operators generate functional signatures of game players and are useful for their automated analysis independent of representation or encoding. The theory ...
Jeffrey Tsang
169
Voted
TDP
2010
189views more  TDP 2010»
14 years 10 months ago
The PROBE Framework for the Personalized Cloaking of Private Locations
The widespread adoption of location-based services (LBS) raises increasing concerns for the protection of personal location information. A common strategy, referred to as obfuscati...
Maria Luisa Damiani, Elisa Bertino, Claudio Silves...
144
Voted
TDSC
2010
172views more  TDSC 2010»
14 years 10 months ago
Proactive Detection of Computer Worms Using Model Checking
Although recent estimates are speaking of 200,000 different viruses, worms, and Trojan horses, the majority of them are variants of previously existing malware. As these variants m...
Johannes Kinder, Stefan Katzenbeisser, Christian S...
« Prev « First page 1885 / 2083 Last » Next »