Sciweavers

1307 search results - page 196 / 262
» Follow the intellectual property
Sort
View
EDM
2009
114views Data Mining» more  EDM 2009»
14 years 7 months ago
Edu-mining for Book Recommendation for Pupils
This paper proposes a novel method for recommending books to pupils based on a framework called Edu-mining. One of the properties of the proposed method is that it uses only loan h...
Ryo Nagata, Keigo Takeda, Koji Suda, Jun'ichi Kake...
HVEI
2009
14 years 7 months ago
Towards a true spherical camera
We present the design of a spherical imaging system with the following properties: (i) A 4 field of view that enables it to "see" in all directions; (ii) a single center...
Gurunandan Krishnan, Shree K. Nayar
ICC
2009
IEEE
106views Communications» more  ICC 2009»
14 years 7 months ago
Hybrid ARQ with Rate Adaptation in Multiband OFDM UWB Systems
In this paper, we propose a cross-layer design (CLD) scheme combining rate adaptation and four types of hybrid automatic repeat request (HARQ) for multiband orthogonal frequency di...
Cheng-Xiang Wang, Heung-Gyoon Ryu, Hsiao-Hwa Chen,...
ICDAR
2009
IEEE
14 years 7 months ago
Coupled Snakelet Model for Curled Textline Segmentation of Camera-Captured Document Images
Detection of curled textline is important for dewarping of hand-held camera-captured document images. Then baselines and the lines following the top of x-height of characters (x-l...
Syed Saqib Bukhari, Faisal Shafait, Thomas M. Breu...
CRYPTO
2010
Springer
170views Cryptology» more  CRYPTO 2010»
14 years 6 months ago
Securing Computation against Continuous Leakage
We present a general method to compile any cryptographic algorithm into one which resists side channel attacks of the only computation leaks information variety for an unbounded nu...
Shafi Goldwasser, Guy N. Rothblum