Sciweavers

15372 search results - page 2862 / 3075
» The Semantics of Semantic Annotation
Sort
View
150
Voted
HOST
2011
IEEE
14 years 12 days ago
Enhancing security via provably trustworthy hardware intellectual property
—We introduce a novel hardware intellectual property acquisition protocol, show how it can support the transfer of provably trustworthy modules between hardware IP producers and ...
Eric Love, Yier Jin, Yiorgos Makris
IACR
2011
101views more  IACR 2011»
14 years 12 days ago
Policy-Enhanced Private Set Intersection: Sharing Information While Enforcing Privacy Policies
Companies, organizations, and individuals often wish to share information to realize valuable social and economic goals. Unfortunately, privacy concerns often stand in the way of ...
Emil Stefanov, Elaine Shi, Dawn Song
ICAIL
2011
ACM
14 years 11 days ago
Argument schemes for two-phase democratic deliberation
A formal two-phase model of democratic policy deliberation is presented, in which in the first phase sufficient and necessary criteria for proposals to be accepted are determine...
Trevor J. M. Bench-Capon, Henry Prakken, Wietske V...
ICDAR
2011
IEEE
14 years 11 days ago
Edge-Based Features for Localization of Artificial Urdu Text in Video Images
—Content-based video indexing and retrieval has become an interesting research area with the tremendous growth in the amount of digital media. In addition to the audio-visual con...
Akhtar Jamil, Imran Siddiqi, Fahim Arif, Ahsen Raz...
188
Voted
ICCV
2009
IEEE
16 years 5 months ago
Modelling Activity Global Temporal Dependencies using Time Delayed Probabilistic Graphical Model
We present a novel approach for detecting global behaviour anomalies in multiple disjoint cameras by learning time delayed dependencies between activities cross camera views. Sp...
Chen Change Loy, Tao Xiang and Shaogang Gong
« Prev « First page 2862 / 3075 Last » Next »