Sciweavers

2740 search results - page 356 / 548
» Approximating Component Selection
Sort
View
121
Voted
ICIP
2005
IEEE
16 years 2 months ago
Visual tracking via efficient kernel discriminant subspace learning
Robustly tracking moving objects in video sequences is one of the key problems in computer vision. In this paper we introduce a computationally efficient nonlinear kernel learning...
Chunhua Shen, Anton van den Hengel, Michael J. Bro...
189
Voted
ICDE
1999
IEEE
116views Database» more  ICDE 1999»
16 years 2 months ago
Working Together in Harmony - An Implementation of the CORBA Object Query Service and Its Evaluation
The CORBA standard, together with its service specifications, has gained considerable attention in recent years. The CORBA Object Query Service allows for declarative access to he...
Klemens Böhm, Uwe Röhm
75
Voted
DAC
2002
ACM
16 years 2 months ago
A fast optical propagation technique for modeling micro-optical systems
As designers become more aggressive in introducing optical components to micro-systems, rigorous optical models are required for system-level simulation tools. Common optical mode...
Timothy P. Kurzweg, Steven P. Levitan, Jose A. Mar...
110
Voted
ICML
2007
IEEE
16 years 1 months ago
Unsupervised estimation for noisy-channel models
Shannon's Noisy-Channel model, which describes how a corrupted message might be reconstructed, has been the corner stone for much work in statistical language and speech proc...
Markos Mylonakis, Khalil Sima'an, Rebecca Hwa
110
Voted
PKC
2009
Springer
102views Cryptology» more  PKC 2009»
16 years 1 months ago
A Practical Key Recovery Attack on Basic TCHo
TCHo is a public key encryption scheme based on a stream cipher component, which is particular suitable for low cost devices like RFIDs. In its basic version, TCHo offers no IND-CC...
Mathias Herrmann, Gregor Leander