Sciweavers

854 search results - page 107 / 171
» From Fuzzy - to Bipolar - Datalog
Sort
View
CHES
2006
Springer
134views Cryptology» more  CHES 2006»
15 years 3 months ago
Read-Proof Hardware from Protective Coatings
In cryptography it is assumed that adversaries only have black box access to the secret keys of honest parties. In real life, however, the black box approach is not sufficient beca...
Pim Tuyls, Geert Jan Schrijen, Boris Skoric, Jan v...
IJSTM
2008
77views more  IJSTM 2008»
14 years 11 months ago
The internal differentiation of the KIBS sector: empirical evidence from cluster analysis
: The sector of Knowledge-Intensive Business Services (KIBS) is characterised by high rates of firm fluctuation, rapid changes in technological progress (e.g., in the software indu...
Daniel Horgos, Andreas Koch
ICMCS
2009
IEEE
133views Multimedia» more  ICMCS 2009»
14 years 9 months ago
View indepedent human movement recognition from multi-view video exploiting a circular invariant posture representation
In this paper a novel method for view independent human movement representation and recognition, exploiting the rich information contained in multi-view videos, is proposed. The bi...
Nikolaos Gkalelis, Nikos Nikolaidis, Ioannis Pitas
TCC
2005
Springer
116views Cryptology» more  TCC 2005»
15 years 5 months ago
Error Correction in the Bounded Storage Model
We initiate a study of Maurer’s bounded storage model (JoC, 1992) in presence of transmission errors and perhaps other types of errors that cause different parties to have incon...
Yan Zong Ding
ICCS
2001
Springer
15 years 4 months ago
Inclusion-Based Approximate Reasoning
Nowadays, people start to accept fuzzy rule–based systems as flexible and convenient tools to solve a myriad of ill–defined but otherwise (for humans) straightforward tasks s...
Chris Cornelis, Etienne E. Kerre