Sciweavers

29046 search results - page 188 / 5810
» Computable Models
Sort
View
ICDAR
2007
IEEE
15 years 7 months ago
On Computing Strength of Evidence for Writer Verification
The problem of Writer Verification is to make a decision of whether or not two handwritten documents are written by the same person. Providing a strength of evidence for any such ...
Harish Srinivasan, S. Kabra, Chen Huang, Sargur N....
ISWC
2002
IEEE
15 years 8 months ago
Using Wearable Computers to Construct Semantic Representations of Physical Spaces
The representation of physical space has traditionally focused on keyphrases such as “Computer Science Building” or “Physics Department” that help us in describing and nav...
Fernando Diaz
COMPGEOM
2007
ACM
15 years 7 months ago
Computing the exact arrangement of circles on a sphere, with applications in structural biology: video
The Bentley-Ottmann (BO) algorithm, initially designed to report the intersection points of line-segments in the plane, is the prototypical sweep-line algorithm. This video presen...
Frédéric Cazals, Sébastien Lo...
TCC
2005
Springer
94views Cryptology» more  TCC 2005»
15 years 9 months ago
Optimal Error Correction Against Computationally Bounded Noise
For computationally bounded adversarial models of error, we construct appealingly simple, efficient, cryptographic encoding and unique decoding schemes whose error-correction capab...
Silvio Micali, Chris Peikert, Madhu Sudan, David A...
100
Voted
CORR
2010
Springer
146views Education» more  CORR 2010»
15 years 3 months ago
Building Computer Network Attacks
In this work we start walking the path to a new perspective for viewing cyberwarfare scenarios, by introducing conceptual tools (a formal model) to evaluate the costs of an attack...
Ariel Futoransky, Luciano Notarfrancesco, Gerardo ...