Sciweavers

7918 search results - page 1577 / 1584
» Model Composition Directives
Sort
View
CORR
2011
Springer
174views Education» more  CORR 2011»
14 years 4 months ago
Distributed Private Data Analysis: On Simultaneously Solving How and What
We examine the combination of two directions in the field of privacy concerning computations over distributed private inputs – secure function evaluation (SFE) and differential...
Amos Beimel, Kobbi Nissim, Eran Omri
CORR
2010
Springer
122views Education» more  CORR 2010»
14 years 4 months ago
Concavity of Mutual Information Rate for Input-Restricted Finite-State Memoryless Channels at High SNR
We consider a finite-state memoryless channel with i.i.d. channel state and the input Markov process supported on a mixing finite-type constraint. We discuss the asymptotic behavio...
Guangyue Han, Brian H. Marcus
98
Voted
WWW
2011
ACM
14 years 4 months ago
Prophiler: a fast filter for the large-scale detection of malicious web pages
Malicious web pages that host drive-by-download exploits have become a popular means for compromising hosts on the Internet and, subsequently, for creating large-scale botnets. In...
Davide Canali, Marco Cova, Giovanni Vigna, Christo...
CDC
2010
IEEE
114views Control Systems» more  CDC 2010»
14 years 4 months ago
On subspace identification of cascade structured systems
Subspace identification has proven useful when identifying identifying multi-input multi-output systems. It is, however, important in many applications to take a priori structural ...
Per Hagg, Bo Wahlberg, Henrik Sandberg
PAMI
2011
14 years 4 months ago
Robust Stereo Matching Using Adaptive Normalized Cross-Correlation
—A majority of the existing stereo matching algorithms assume that the corresponding color values are similar to each other. However, it is not so in practice as image color valu...
Yong Seok Heo, Kyoung Mu Lee, Sang Uk Lee
« Prev « First page 1577 / 1584 Last » Next »