Sciweavers

1307 search results - page 196 / 262
» Follow the intellectual property
Sort
View
EDM
2009
114views Data Mining» more  EDM 2009»
14 years 11 months ago
Edu-mining for Book Recommendation for Pupils
This paper proposes a novel method for recommending books to pupils based on a framework called Edu-mining. One of the properties of the proposed method is that it uses only loan h...
Ryo Nagata, Keigo Takeda, Koji Suda, Jun'ichi Kake...
HVEI
2009
14 years 11 months ago
Towards a true spherical camera
We present the design of a spherical imaging system with the following properties: (i) A 4 field of view that enables it to "see" in all directions; (ii) a single center...
Gurunandan Krishnan, Shree K. Nayar
ICC
2009
IEEE
106views Communications» more  ICC 2009»
14 years 11 months ago
Hybrid ARQ with Rate Adaptation in Multiband OFDM UWB Systems
In this paper, we propose a cross-layer design (CLD) scheme combining rate adaptation and four types of hybrid automatic repeat request (HARQ) for multiband orthogonal frequency di...
Cheng-Xiang Wang, Heung-Gyoon Ryu, Hsiao-Hwa Chen,...
ICDAR
2009
IEEE
14 years 11 months ago
Coupled Snakelet Model for Curled Textline Segmentation of Camera-Captured Document Images
Detection of curled textline is important for dewarping of hand-held camera-captured document images. Then baselines and the lines following the top of x-height of characters (x-l...
Syed Saqib Bukhari, Faisal Shafait, Thomas M. Breu...
CRYPTO
2010
Springer
170views Cryptology» more  CRYPTO 2010»
14 years 10 months ago
Securing Computation against Continuous Leakage
We present a general method to compile any cryptographic algorithm into one which resists side channel attacks of the only computation leaks information variety for an unbounded nu...
Shafi Goldwasser, Guy N. Rothblum