Sciweavers

7213 search results - page 1404 / 1443
» Automated model grouping
Sort
View
SCN
2010
Springer
187views Communications» more  SCN 2010»
14 years 8 months ago
Searching Keywords with Wildcards on Encrypted Data
Abstract. A hidden vector encryption scheme (HVE) is a derivation of identity-based encryption, where the public key is actually a vector over a certain alphabet. The decryption ke...
Saeed Sedghi, Peter van Liesdonk, Svetla Nikova, P...
SIAMJO
2010
121views more  SIAMJO 2010»
14 years 8 months ago
Optimization Strategies for the Vulnerability Analysis of the Electric Power Grid
Identifying small groups of lines, whose removal would cause a severe blackout, is critical for the secure operation of the electric power grid. We show how power grid vulnerabilit...
Ali Pinar, Juan Meza, Vaibhav Donde, Bernard C. Le...
ICPR
2010
IEEE
14 years 7 months ago
A Re-evaluation of Pedestrian Detection on Riemannian Manifolds
Abstract--Boosting covariance data on Riemannian manifolds has proven to be a convenient strategy in a pedestrian detection context. In this paper we show that the detection perfor...
Diego Tosato, Michela Farenzena, Marco Cristani, V...
MICCAI
2010
Springer
14 years 7 months ago
ECG-Gated Interventional Cardiac Reconstruction for Non-periodic Motion
The 3-D reconstruction of cardiac vasculature using C-arm CT is an active and challenging field of research. In interventional environments patients often do have arrhythmic heart ...
Christopher Rohkohl, Günter Lauritsch, Lisa B...
AIED
2009
Springer
14 years 7 months ago
Investigating the Effects of Social Goals in a Negotiation Game with Virtual Humans
Educational games may be particularly suited to teaching social learning skills with virtual humans. We investigate the importance of social goals and engaging social interactions ...
Amy Ogan, Vincent Aleven, Christopher Jones
« Prev « First page 1404 / 1443 Last » Next »