Sciweavers

813 search results - page 65 / 163
» Pipeline-centric provenance model
Sort
View
65
Voted
ICPR
2006
IEEE
16 years 1 months ago
Onset Detection through Maximal Redundancy Detection
We propose a criterion, called `maximal redundancy', for onset detection in time series. The concept redundancy is adopted from information theory and indicates how well a si...
Gert Van Dijck, Marc M. Van Hulle
99
Voted
ICPR
2004
IEEE
16 years 1 months ago
Robust Carving for Non-Lambertian Objects
This paper presents a new surface reconstruction method that extends previous carving methods for non-Lambertian objects by integrating the smoothness and image information of dif...
Gang Zeng, Sylvain Paris, Long Quan
118
Voted
ICML
2009
IEEE
16 years 1 months ago
Online dictionary learning for sparse coding
Sparse coding--that is, modelling data vectors as sparse linear combinations of basis elements--is widely used in machine learning, neuroscience, signal processing, and statistics...
Julien Mairal, Francis Bach, Jean Ponce, Guillermo...
PKC
2009
Springer
115views Cryptology» more  PKC 2009»
16 years 1 months ago
Compact CCA-Secure Encryption for Messages of Arbitrary Length
This paper proposes a chosen-ciphertext secure variant of the ElGamal public-key encryption scheme which generates very compact ciphertexts for messages of arbitrary length. The ci...
Masayuki Abe, Eike Kiltz, Tatsuaki Okamoto
IEEEARES
2010
IEEE
15 years 7 months ago
Pitfalls in Formal Reasoning about Security Protocols
Formal verification can give more confidence in the security of cryptographic protocols. Application specific security properties like “The service provider does not loose mo...
Nina Moebius, Kurt Stenzel, Wolfgang Reif