Sciweavers

7921 search results - page 1516 / 1585
» LSH-preserving functions and their applications
Sort
View
CASES
2005
ACM
14 years 11 months ago
Hardware support for code integrity in embedded processors
Computer security becomes increasingly important with continual growth of the number of interconnected computing platforms. Moreover, as capabilities of embedded processors increa...
Milena Milenkovic, Aleksandar Milenkovic, Emil Jov...
ICALP
2010
Springer
14 years 11 months ago
From Secrecy to Soundness: Efficient Verification via Secure Computation
d Abstract) Benny Applebaum1 , Yuval Ishai2 , and Eyal Kushilevitz3 1 Computer Science Department, Weizmann Institute of Science 2 Computer Science Department, Technion and UCLA 3 ...
Benny Applebaum, Yuval Ishai, Eyal Kushilevitz
MIR
2010
ACM
325views Multimedia» more  MIR 2010»
14 years 11 months ago
A classification-driven similarity matching framework for retrieval of biomedical images
This paper presents a classification-driven biomedical image retrieval system to bride the semantic gap by transforming image features to their global categories at different gran...
Md. Mahmudur Rahman, Sameer Antani, George R. Thom...
ACCV
2007
Springer
14 years 11 months ago
A Convex Programming Approach to the Trace Quotient Problem
Abstract. The trace quotient problem arises in many applications in pattern classification and computer vision, e.g., manifold learning, low-dimension embedding, etc. The task is ...
Chunhua Shen, Hongdong Li, Michael J. Brooks
ECCE
2007
14 years 11 months ago
Lateral control support for car drivers: a human-machine cooperation approach
Motivation – This paper is based on a research project which examines the way car drivers and automated devices cooperate to achieve lateral control of a vehicle. A theoretical ...
Jordan Navarro, Franck Mars, Jean-Michel Hoc
« Prev « First page 1516 / 1585 Last » Next »