Sciweavers

2373 search results - page 443 / 475
» Modelling Facial Behaviours
Sort
View
ENTCS
2007
88views more  ENTCS 2007»
14 years 11 months ago
Keeping Secrets in Resource Aware Components
We present a powerful and flexible method for automatically checking the secrecy of values inside components. In our framework an attacker may monitor the external communication ...
Tom Chothia, Jun Pang, Muhammad Torabi Dashti
MVA
2008
201views Computer Vision» more  MVA 2008»
14 years 11 months ago
How close are we to solving the problem of automated visual surveillance?
The problem of automated visual surveillance has spawned a lively research area, with 2005 seeing three conferences or workshops and special issues of two major journals devoted to...
Hannah M. Dee, Sergio A. Velastin
LISP
2006
105views more  LISP 2006»
14 years 11 months ago
Call-by-push-value: Decomposing call-by-value and call-by-name
We present the call-by-push-value (CBPV) calculus, which decomposes the typed call-by-value (CBV) and typed call-by-name (CBN) paradigms into fine-grain primitives. On the operatio...
Paul Blain Levy
NN
2008
Springer
107views Neural Networks» more  NN 2008»
14 years 11 months ago
Impact of temporal coding of presynaptic entorhinal cortex grid cells on the formation of hippocampal place fields
Many behavioural experiments have pointed out the important role played by the hippocampus in spatial navigation. This role was enlightened by the discovery of hippocampal cells i...
Colin Molter, Yoko Yamaguchi
PR
2008
131views more  PR 2008»
14 years 11 months ago
A memetic algorithm for evolutionary prototype selection: A scaling up approach
Prototype selection problem consists of reducing the size of databases by removing samples that are considered noisy or not influential on nearest neighbour classification tasks. ...
Salvador García, José Ramón C...