Sciweavers

436 search results - page 68 / 88
» On two variations of identifying codes
Sort
View
MLDM
2005
Springer
15 years 3 months ago
Unsupervised Learning of Visual Feature Hierarchies
We propose an unsupervised, probabilistic method for learning visual feature hierarchies. Starting from local, low-level features computed at interest point locations, the method c...
Fabien Scalzo, Justus H. Piater
ACSAC
2000
IEEE
15 years 2 months ago
Efficient Commerce Protocols based on One-Time Pads
We present a new commerce protocol that allows customers and merchants to conduct face-to-face creditcard authorizations with a credit card company securely with the option of ano...
Michael A. Schneider, Edward W. Felten
COMPSAC
2000
IEEE
15 years 2 months ago
A Practical Method for Watermarking Java Programs
Java programs distributed through Internet are now suffering from program theft. It is because Java programs can be easily decomposed into reusable class files and even decompiled...
Akito Monden, Hajimu Iida, Ken-ichi Matsumoto, Koj...
RSP
1999
IEEE
160views Control Systems» more  RSP 1999»
15 years 2 months ago
Mixed Abstraction Level Hardware Synthesis from SDL for Rapid Prototyping
SDL is currently gaining interest as a system level specification language for HW/SW codesign. Automated synthesis of SDL in hardware so far had problems with its efficiency. The ...
Oliver Bringmann, Wolfgang Rosenstiel, Annette Mut...
AADEBUG
1997
Springer
15 years 2 months ago
Bisection Debugging
This paper introduces the bisection debugging model. The key idea is to use a debugger to identify the semantic differences between two versions of the same program. The debugger ...
Thomas R. Gross