Sciweavers

1936 search results - page 115 / 388
» Unbundling Active Functionality
Sort
View
123
Voted
NAR
2011
176views Computer Vision» more  NAR 2011»
14 years 6 months ago
IUPHAR-DB: new receptors and tools for easy searching and visualization of pharmacological data
The IUPHAR database is an established online reference resource for several important classes of human drug targets and related proteins. As well as providing recommended nomencla...
Joanna L. Sharman, Chidochangu P. Mpamhanga, Micha...
119
Voted
ISCA
2012
IEEE
191views Hardware» more  ISCA 2012»
13 years 6 months ago
VRSync: Characterizing and eliminating synchronization-induced voltage emergencies in many-core processors
Power consumption is a primary concern for microprocessor designers. Lowering the supply voltage of processors is one of the most effective techniques for improving their energy e...
Timothy N. Miller, Renji Thomas, Xiang Pan, Radu T...
167
Voted
IJCV
2008
209views more  IJCV 2008»
15 years 2 months ago
Motion and Appearance Nonparametric Joint Entropy for Video Segmentation
This paper deals with video segmentation based on motion and spatial information. Classically, the motion term is based on a motion compensation error (MCE) between two consecutiv...
Sylvain Boltz, Ariane Herbulot, Eric Debreuve, Mic...
228
Voted
FSE
2011
Springer
289views Cryptology» more  FSE 2011»
14 years 7 months ago
On Cipher-Dependent Related-Key Attacks in the Ideal-Cipher Model
Abstract. Bellare and Kohno introduced a formal framework for the study of related-key attacks against blockciphers. They established sufficient conditions (output-unpredictabilit...
Martin R. Albrecht, Pooya Farshim, Kenny G. Paters...
164
Voted
CVPR
2012
IEEE
13 years 6 months ago
Spherical hashing
Many binary code encoding schemes based on hashing have been actively studied recently, since they can provide efficient similarity search, especially nearest neighbor search, an...
Jae-Pil Heo, Youngwoon Lee, Junfeng He, Shih-Fu Ch...