Sciweavers

130 search results - page 25 / 26
» The Semantics of Scheme Control-Flow Analysis
Sort
View
ICIP
2009
IEEE
14 years 7 months ago
An attention model for extracting components that merit identification
Cognitive systems are trained to recognise perceptually meaningful parts of an image. These regions contain some variation, i.e. local texture, and are roughly convex. We call suc...
Mohammad Jahangiri, Maria Petrou
CIVR
2008
Springer
213views Image Analysis» more  CIVR 2008»
14 years 11 months ago
Language modeling for bag-of-visual words image categorization
In this paper, we propose two ways of improving image classification based on bag-of-words representation [25]. Two shortcomings of this representation are the loss of the spatial...
Pierre Tirilly, Vincent Claveau, Patrick Gros
OOPSLA
2009
Springer
15 years 4 months ago
Scalable nonblocking concurrent objects for mission critical code
The high degree of complexity and autonomy of future robotic space missions, such as Mars Science Laboratory (MSL), poses serious challenges in assuring their reliability and efï¬...
Damian Dechev, Bjarne Stroustrup
CANS
2006
Springer
136views Cryptology» more  CANS 2006»
15 years 1 months ago
Watermarking Essential Data Structures for Copyright Protection
Software watermarking is a new research area that aims at providing copyright protection for commercial software. It minimizes software piracy by hiding copyright signatures inside...
Qutaiba Albluwi, Ibrahim Kamel
LATINCRYPT
2010
14 years 8 months ago
Mediated Traceable Anonymous Encryption
the full version of the extended abstract which appears in Latincrypt '10 (august 8-11, 2010, Puebla, Mexico) M. Abdalla and P. Barreto Eds., Springer-Verlag, LNCS 6212, pages...
Malika Izabachène, David Pointcheval, Damie...