Sciweavers

7839 search results - page 298 / 1568
» What's there and what's not
Sort
View
TISSEC
2010
72views more  TISSEC 2010»
15 years 5 days ago
Deterring voluntary trace disclosure in re-encryption mix-networks
An all too real threat to the privacy offered by a mix network is that individual mix administrators may volunteer partial tracing information to a coercer. While this threat can ...
XiaoFeng Wang, Philippe Golle, Markus Jakobsson, A...
CVPR
2011
IEEE
14 years 10 months ago
On Deep Generative Models with Applications to Recognition
The most popular way to use probabilistic models in vision is first to extract some descriptors of small image patches or object parts using well-engineered features, and then to...
Marc', Aurelio Ranzato, Joshua Susskind, Volodymyr...
TCAD
2010
121views more  TCAD 2010»
14 years 8 months ago
Translation Validation of High-Level Synthesis
The growing complexity of systems and their implementation into silicon encourages designers to look for model designs at higher levels of abstraction and then incrementally build ...
Sudipta Kundu, Sorin Lerner, Rajesh K. Gupta
153
Voted
ICCV
2011
IEEE
14 years 1 months ago
Sparse Dictionary-based Representation and Recognition of Action Attributes
We present an approach for dictionary learning of action attributes via information maximization. We unify the class distribution and appearance information into an objective func...
Qiang Qiu, Zhuolin Jiang, Rama Chellappa
133
Voted
INFSOF
2008
201views more  INFSOF 2008»
15 years 1 months ago
Motivation in Software Engineering: A systematic literature review
Objective: In this paper, we present a systematic literature review of motivation in Software Engineering. The objective of this review is to plot the landscape of current reporte...
Sarah Beecham, Nathan Baddoo, Tracy Hall, Hugh Rob...