Sciweavers

6202 search results - page 1186 / 1241
» Without Loss of Generality
Sort
View
SAC
2008
ACM
14 years 9 months ago
Removing useless variables in cost analysis of Java bytecode
Automatic cost analysis has interesting applications in the context of verification and certification of mobile code. For instance, the code receiver can use cost information in o...
Elvira Albert, Puri Arenas, Samir Genaim, Germ&aac...
SAC
2008
ACM
14 years 9 months ago
Tag-aware recommender systems by fusion of collaborative filtering algorithms
Recommender Systems (RS) aim at predicting items or ratings of items that the user are interested in. Collaborative Filtering (CF) algorithms such as user- and item-based methods ...
Karen H. L. Tso-Sutter, Leandro Balby Marinho, Lar...
SAC
2008
ACM
14 years 9 months ago
Digital audio watermarking evaluation within the application field of perceptual hashing
Digital watermarking is a growing research area to mark digital content by embedding information into the content itself. Perceptual hashing is used to identify a specific content...
Andreas Lang, Jana Dittmann
SAC
2008
ACM
14 years 9 months ago
Offline count-limited certificates
In this paper, we present the idea of offline count-limited certificates (or clics for short), and show how these can be implemented using minimal trusted hardware functionality a...
Luis F. G. Sarmenta, Marten van Dijk, Jonathan Rho...
ICPR
2010
IEEE
14 years 9 months ago
Scene-Adaptive Human Detection with Incremental Active Learning
In many computer vision tasks, scene changes hinder the generalization ability of trained classifiers. For instance, a human detector trained with one set of images is unlikely t...
Ajay Joshi, Fatih Porikli
« Prev « First page 1186 / 1241 Last » Next »