Sciweavers

15840 search results - page 2985 / 3168
» The Control of Synchronous Systems
Sort
View
POPL
2012
ACM
14 years 13 days ago
Higher-order functional reactive programming in bounded space
Functional reactive programming (FRP) is an elegant and successful approach to programming reactive systems declaratively. The high levels of abstraction and expressivity that mak...
Neelakantan R. Krishnaswami, Nick Benton, Jan Hoff...
CVPR
2012
IEEE
13 years 7 months ago
A line-structure-preserving approach to image resizing
This paper proposes a content-aware image resizing method which simultaneously preserves both salient image features and important line structure properties: parallelism, collinea...
Che-Han Chang, Yung-Yu Chuang
EUROSYS
2010
ACM
15 years 11 months ago
PUSH: A Dataflow Shell
The deluge of huge data sets such as those provided by sensor networks, online transactions, and the web provide exciting opportunities for data analysis. The scale of the data ...
Noah Evans, Eric Van Hensbergen
FDTC
2009
Springer
189views Cryptology» more  FDTC 2009»
15 years 11 months ago
KeeLoq and Side-Channel Analysis-Evolution of an Attack
—Last year we were able to break KeeLoq, which is a 64 bit block cipher that is popular for remote keyless entry (RKE) systems. KeeLoq RKEs are widely used for access control pur...
Christof Paar, Thomas Eisenbarth, Markus Kasper, T...
CIVR
2006
Springer
131views Image Analysis» more  CIVR 2006»
15 years 8 months ago
Exploring the Synergy of Humans and Machines in Extreme Video Retrieval
We introduce an interface for efficient video search that exploits the human ability to quickly scan visual content, after automatic retrieval has arrange the images in expected or...
Alexander G. Hauptmann, Wei-Hao Lin, Rong Yan, Jun...
« Prev « First page 2985 / 3168 Last » Next »