Sciweavers

989 search results - page 29 / 198
» HowNet and Its Computation of Meaning
Sort
View
EUROCRYPT
2008
Springer
14 years 11 months ago
New Constructions for UC Secure Computation Using Tamper-Proof Hardware
The Universal Composability framework was introduced by Canetti to study the security of protocols which are concurrently executed with other protocols in a network environment. U...
Nishanth Chandran, Vipul Goyal, Amit Sahai
CHI
2007
ACM
15 years 10 months ago
Who killed design?: addressing design through an interdisciplinary investigation
ended abstract describes the grounding for an interdisciplinary discussion regarding the contemporary meaning of "Design", "Designer", and "Designed"...
Scott Pobiner, Anijo Punnen Mathew
IJCNN
2000
IEEE
15 years 1 months ago
Analysis of Fluctuation-Induced Firing in the Presence of Inhibition
This paper examines the computational role of inhibition as it moves towards balancing concurrent excitation using the biologically-inspired Temporal Noisy-Leaky Integrator (TNLI) ...
Chris Christodoulou, Trevor G. Clarkson, John G. T...
79
Voted
CVPR
2005
IEEE
15 years 11 months ago
Spatiograms versus Histograms for Region-Based Tracking
We introduce the concept of a spatiogram, which is a generalization of a histogram that includes potentially higher order moments. A histogram is a zeroth-order spatiogram, while ...
Stan Birchfield, Sriram Rangarajan
MOC
2002
135views more  MOC 2002»
14 years 9 months ago
A fast spherical harmonics transform algorithm
The spectral method with discrete spherical harmonics transform plays an important role in many applications. In spite of its advantages, the spherical harmonics transform has a dr...
Reiji Suda, Masayasu Takami