Sciweavers

3084 search results - page 617 / 617
» Learning to Take Actions
Sort
View
CRYPTO
2011
Springer
245views Cryptology» more  CRYPTO 2011»
13 years 9 months ago
Fully Homomorphic Encryption from Ring-LWE and Security for Key Dependent Messages
We present a somewhat homomorphic encryption scheme that is both very simple to describe and analyze, and whose security (quantumly) reduces to the worst-case hardness of problems ...
Zvika Brakerski, Vinod Vaikuntanathan
CVPR
2012
IEEE
13 years 1 days ago
Geodesic flow kernel for unsupervised domain adaptation
In real-world applications of visual recognition, many factors—such as pose, illumination, or image quality—can cause a significant mismatch between the source domain on whic...
Boqing Gong, Yuan Shi, Fei Sha, Kristen Grauman
ECCV
2008
Springer
15 years 11 months ago
Robust 3D Pose Estimation and Efficient 2D Region-Based Segmentation from a 3D Shape Prior
In this work, we present an approach to jointly segment a rigid object in a 2D image and estimate its 3D pose, using the knowledge of a 3D model. We naturally couple the two proces...
Samuel Dambreville, Romeil Sandhu, Anthony J. Yezz...
BMCBI
2008
141views more  BMCBI 2008»
14 years 9 months ago
MiRTif: a support vector machine-based microRNA target interaction filter
Background: MicroRNAs (miRNAs) are a set of small non-coding RNAs serving as important negative gene regulators. In animals, miRNAs turn down protein translation by binding to the...
Yuchen Yang, Yu-Ping Wang, Kuo-Bin Li