Sciweavers

27692 search results - page 292 / 5539
» Where is ...
Sort
View
ICPR
2004
IEEE
16 years 1 months ago
Object Detection using Background Context
Detection of objects is in general a computationally demanding task. To simplify the problem it is of interest to utilize contextual information and perform a staggered recognitio...
Ola Ramström, Henrik I. Christensen
94
Voted
ICPR
2004
IEEE
16 years 1 months ago
Alignment of Multiple Non-Overlapping Axially Symmetric 3D Datasets
Uknown to us, an axially-symmetric surface is broken into disjoint pieces along a set of break-curves, i.e., the curves along which the surface locally breaks into two pieces. A s...
Andrew R. Willis, David B. Cooper
117
Voted
ICML
2002
IEEE
16 years 1 months ago
Syllables and other String Kernel Extensions
During the last years, the use of string kernels that compare documents has been shown to achieve good results on text classification problems. In this paper we introduce the appl...
Craig Saunders, Hauke Tschach, John Shawe-Taylor
183
Voted
ICDT
2009
ACM
130views Database» more  ICDT 2009»
16 years 1 months ago
Towards a theory of search queries
The need to manage diverse information sources has triggered the rise of very loosely structured data models, known as "dataspace models." Such information management sy...
George H. L. Fletcher, Jan Van den Bussche, Dirk V...
130
Voted
STOC
2009
ACM
145views Algorithms» more  STOC 2009»
16 years 1 months ago
Non-malleable extractors and symmetric key cryptography from weak secrets
We study the question of basing symmetric key cryptography on weak secrets. In this setting, Alice and Bob share an n-bit secret W, which might not be uniformly random, but the ad...
Yevgeniy Dodis, Daniel Wichs