Sciweavers

2449 search results - page 288 / 490
» Tensor Embedding Methods
Sort
View
75
Voted
IJCNN
2006
IEEE
15 years 5 months ago
On derivation of stagewise second-order backpropagation by invariant imbedding for multi-stage neural-network learning
— We present a simple, intuitive argument based on “invariant imbedding” in the spirit of dynamic programming to derive a stagewise second-order backpropagation (BP) algorith...
Eiji Mizutani, Stuart Dreyfus
79
Voted
ACSAC
2005
IEEE
15 years 4 months ago
Fault Attacks on Dual-Rail Encoded Systems
Fault induction attacks are a serious concern for designers of secure embedded systems. An ideal solution would be a generic circuit transformation that would produce circuits tha...
Jason Waddle, David Wagner
ICIP
2005
IEEE
15 years 4 months ago
Image-based rendering and tracking of faces
In this paper, we present an image-based method for the tracking and rendering of faces. We use the algorithm in an immersive video conferencing system where multiple participants...
Peter Eisert, Jürgen Rurainsky
70
Voted
ICRA
2005
IEEE
106views Robotics» more  ICRA 2005»
15 years 4 months ago
Development of the NAIST-Hand with Vision-based Tactile Fingertip Sensor
— This paper introduces a multifingered robotic hand eNAIST-Handf and a grip force control by slip margin feedback. The developed prototype finger of the NAISThand has a new me...
Jun Ueda, Y. Ishida, Masahiro Kondo, Tsukasa Ogasa...
69
Voted
CRYPTO
2005
Springer
103views Cryptology» more  CRYPTO 2005»
15 years 4 months ago
Pebbling and Proofs of Work
We investigate methods for providing easy-to-check proofs of computational effort. Originally intended for discouraging spam, the concept has wide applicability as a method for co...
Cynthia Dwork, Moni Naor, Hoeteck Wee