Sciweavers

16190 search results - page 2850 / 3238
» Applicative programming with effects
Sort
View
JCS
2010
80views more  JCS 2010»
14 years 10 months ago
Constraint differentiation: Search-space reduction for the constraint-based analysis of security protocols
We introduce constraint differentiation, a powerful technique for reducing search when model-checking security protocols using constraint-based methods. Constraint differentiation...
Sebastian Mödersheim, Luca Viganò, Dav...
JDCTA
2010
688views more  JDCTA 2010»
14 years 10 months ago
Hand Mouse: Real Time Hand Motion Detection System Based on Analysis of Finger Blobs
Hand detection is a fundamental step in many practical applications as gesture recognition, video surveillance, and multimodal machine interface and so on. The aim of this paper i...
Ibrahim Furkan Ince, Manuel Socarras-Garzon, Tae-C...
JDCTA
2010
225views more  JDCTA 2010»
14 years 10 months ago
Multi-Level Weighted Sequential Pattern Mining Based on Prime Encoding
Encoding can express the hierarchical relationship in the area of mining the multi-level sequential pattern, up to now all the algorithms of which find frequent sequences just acc...
Yun Li, Lianglei Sun, Jiang Yin, Wenyan Bao, Mengy...
JDCTA
2010
118views more  JDCTA 2010»
14 years 10 months ago
Shoppers' Experiences of Digital Signage-a Cross-National Qualitative Study
Digital signage, sometimes known as a Digital Communications Network (DCN) or private plasma screen network, has been little researched to date. This paper puts forward the view t...
Andrew Newman, Charles Dennis, Len-Tiu Wright, Tam...
JMLR
2010
121views more  JMLR 2010»
14 years 10 months ago
Sparse Semi-supervised Learning Using Conjugate Functions
In this paper, we propose a general framework for sparse semi-supervised learning, which concerns using a small portion of unlabeled data and a few labeled data to represent targe...
Shiliang Sun, John Shawe-Taylor
« Prev « First page 2850 / 3238 Last » Next »