Sciweavers

4890 search results - page 790 / 978
» From system specifications to component behavioral models
Sort
View
132
Voted
CASES
2010
ACM
14 years 10 months ago
Implementing virtual secure circuit using a custom-instruction approach
Although cryptographic algorithms are designed to resist at least thousands of years of cryptoanalysis, implementing them with either software or hardware usually leaks additional...
Zhimin Chen, Ambuj Sinha, Patrick Schaumont
103
Voted
MASCOTS
2008
15 years 2 months ago
Network Information Flow in Network of Queues
Two classic categories of models exist for computer networks: network information flow and network of queues. The network information flow model appropriately captures the multi-ho...
Phillipa Gill, Zongpeng Li, Anirban Mahanti, Jingx...
88
Voted
SCHOLARPEDIA
2008
76views more  SCHOLARPEDIA 2008»
14 years 11 months ago
Stomatogastric ganglion
ABSTRACT: The lobster stomatogastric ganglion contains 30 neurons and when modulated can produce two distinct rhythmic motor patterns--the gastric mill and the pyloric. The complet...
Allen I. Selverston
CVPR
2003
IEEE
16 years 2 months ago
Expectation Grammars: Leveraging High-Level Expectations for Activity Recognition
Video-based recognition and prediction of a temporally extended activity can benefit from a detailed description of high-level expectations about the activity. Stochastic grammars...
David Minnen, Irfan A. Essa, Thad Starner
88
Voted
RECSYS
2010
ACM
15 years 26 days ago
Eye-tracking product recommenders' usage
Recommender systems have emerged as an effective decision tool to help users more easily and quickly find products that they prefer, especially in e-commerce environments. However...
Sylvain Castagnos, Nicolas Jones, Pearl Pu