Sciweavers

4752 search results - page 141 / 951
» From computation models to models of provenance: the RWS app...
Sort
View
CSFW
2008
IEEE
15 years 8 months ago
Joint State Theorems for Public-Key Encryption and Digital Signature Functionalities with Local Computation
Composition theorems in simulation-based approaches allow to build complex protocols from sub-protocols in a modular way. However, as first pointed out and studied by Canetti and ...
Ralf Küsters, Max Tuengerthal
EDOC
2007
IEEE
15 years 5 months ago
From Business to IT with SEAM: The J2EE Pet Store Example
Business and IT alignment demands clear traceability between the applications to be developed and the business requirements. SEAM is a systemic visual approach for modeling system...
Irina Rychkova, Gil Regev, Lam-Son Lê, Alain...
ICDM
2009
IEEE
112views Data Mining» more  ICDM 2009»
15 years 8 months ago
Resolving Identity Uncertainty with Learned Random Walks
A pervasive problem in large relational databases is identity uncertainty which occurs when multiple entries in a database refer to the same underlying entity in the world. Relati...
Ted Sandler, Lyle H. Ungar, Koby Crammer
SCIA
2007
Springer
162views Image Analysis» more  SCIA 2007»
15 years 7 months ago
A Robust Approach for 3D Cars Reconstruction
Computing high quality 3D models from multi-view stereo reconstruction is an active topic as can be seen in a recent review [15]. Most approaches make the strong assumption that th...
Adrien Auclair, Laurent D. Cohen, Nicole Vincent
ICPR
2008
IEEE
15 years 8 months ago
Face age estimation using patch-based hidden Markov model supervectors
Recent studies in patch-based Gaussian Mixture Model (GMM) approaches for face age estimation present promising results. We propose using a hidden Markov model (HMM) supervector t...
Xiaodan Zhuang, Xi Zhou, Mark Hasegawa-Johnson, Th...