Sciweavers

3318 search results - page 424 / 664
» The Weak Instance Model
Sort
View
FOCS
2004
IEEE
15 years 8 months ago
Universally Composable Protocols with Relaxed Set-Up Assumptions
A desirable goal for cryptographic protocols is to guarantee security when the protocol is composed with other protocol instances. Universally Composable (UC) protocols provide th...
Boaz Barak, Ran Canetti, Jesper Buus Nielsen, Rafa...
BIS
2009
154views Business» more  BIS 2009»
15 years 5 months ago
Using Process Mining to Generate Accurate and Interactive Business Process Maps
Abstract. The quality of today's digital maps is very high. This allows for new functionality as illustrated by modern car navigation systems (e.g., TomTom, Garmin, etc.), Goo...
Wil M. P. van der Aalst
IJON
2007
74views more  IJON 2007»
15 years 4 months ago
Visual object concept discovery: Observations in congenitally blind children, and a computational approach
Over the course of the first few months of life, our brains accomplish a remarkable feat. They are able to interpret complex visual images so that instead of being just disconnec...
Jake V. Bouvrie, Pawan Sinha
CVPR
2005
IEEE
16 years 6 months ago
OBJ CUT
In this paper we present a principled Bayesian method for detecting and segmenting instances of a particular object category within an image, providing a coherent methodology for ...
M. Pawan Kumar, Philip H. S. Torr, Andrew Zisserma...
CVPR
2005
IEEE
16 years 6 months ago
Online Learning of Probabilistic Appearance Manifolds for Video-Based Recognition and Tracking
This paper presents an online learning algorithm to construct from video sequences an image-based representation that is useful for recognition and tracking. For a class of object...
Kuang-Chih Lee, David J. Kriegman