Sciweavers

43264 search results - page 8515 / 8653
» Comparing models of computation
Sort
View
NAR
2011
257views Computer Vision» more  NAR 2011»
14 years 25 days ago
The STRING database in 2011: functional interaction networks of proteins, globally integrated and scored
An essential prerequisite for any systems-level understanding of cellular functions is to correctly uncover and annotate all functional interactions among proteins in the cell. To...
Damian Szklarczyk, Andrea Franceschini, Michael Ku...
ICCV
2011
IEEE
13 years 10 months ago
2D-3D Fusion for Layer Decomposition of Urban Facades
We present a method for fusing two acquisition modes, 2D photographs and 3D LiDAR scans, for depth-layer decomposition of urban facades. The two modes have complementary character...
Yangyan Li, Qian Zheng, Andrei Sharf, Daniel Cohen...
ICCV
2011
IEEE
13 years 10 months ago
Learning Universal Multi-view Age Estimator by Video Contexts
Most existing techniques for analyzing face images assume that the faces are at near-frontal poses. Generalizing to non-frontal faces is often difficult, due to a dearth of groun...
Zheng Song, Bingbing Ni, Dong Guo, Terence Sim, Sh...
ASIACRYPT
2011
Springer
13 years 10 months ago
BiTR: Built-in Tamper Resilience
The assumption of the availability of tamper-proof hardware tokens has been used extensively in the design of cryptographic primitives. For example, Katz (Eurocrypt 2007) suggests ...
Seung Geol Choi, Aggelos Kiayias, Tal Malkin
CBSE
2011
Springer
13 years 10 months ago
Rectifying orphan components using group-failover in distributed real-time and embedded systems
Orphan requests are a significant problem for multi-tier distributed systems since they adversely impact system correctness by violating the exactly-once semantics of application...
Sumant Tambe, Aniruddha S. Gokhale
« Prev « First page 8515 / 8653 Last » Next »