Sciweavers

412 search results - page 37 / 83
» Generative models for name disambiguation
Sort
View
TIT
2008
187views more  TIT 2008»
14 years 9 months ago
The Bare Bounded-Storage Model: The Tight Bound on the Storage Requirement for Key Agreement
Abstract--In the bounded-storage model (BSM) for information-theoretic secure encryption and key agreement, one makes use of a random string R whose length t is greater than the as...
Stefan Dziembowski, Ueli M. Maurer
SAC
2009
ACM
15 years 4 months ago
Decomposing port automata
Port automata are an operational model for component connectors in a coordination language such as Reo. They describe which sets of ports can synchronize in each state of the conn...
Christian Koehler, Dave Clarke
CGF
2004
203views more  CGF 2004»
14 years 9 months ago
A Biophysically-Based Spectral Model of Light Interaction with Human Skin
Despite the notable progress in physically-based rendering, there is still a long way to go before we can automatically generate predictable images of biological materials. In thi...
Aravind Krishnaswamy, Gladimir V. G. Baranoski
JELIA
2004
Springer
15 years 3 months ago
On the Relation Between ID-Logic and Answer Set Programming
This paper is an analysis of two knowledge representation extensions of logic programming, namely Answer Set Programming and ID-Logic. Our aim is to compare both logics on the leve...
Maarten Mariën, David Gilis, Marc Denecker
ECCV
2006
Springer
15 years 11 months ago
Face Authentication Using Adapted Local Binary Pattern Histograms
In this paper, we propose a novel generative approach for face authentication, based on a Local Binary Pattern (LBP) description of the face. A generic face model is considered as ...
Sébastien Marcel, Yann Rodriguez