Sciweavers

5962 search results - page 360 / 1193
» Working with Patterns and Code
Sort
View
JCT
2010
87views more  JCT 2010»
15 years 3 months ago
Bijections between pattern-avoiding fillings of Young diagrams
The pattern-avoiding fillings of Young diagrams we study arose from Postnikov’s work on positive Grassman cells. They are called Γ -diagrams, and are in bijection with decorate...
Matthieu Josuat-Vergès
ACL
2009
15 years 2 months ago
Summarizing multiple spoken documents: finding evidence from untranscribed audio
This paper presents a model for summarizing multiple untranscribed spoken documents. Without assuming the availability of transcripts, the model modifies a recently proposed unsup...
Xiaodan Zhu, Gerald Penn, Frank Rudzicz
CSCW
2012
ACM
14 years 23 days ago
Lurking as personal trait or situational disposition: lurking and contributing in enterprise social media
We examine patterns of participation by employees who are members of multiple online communities in an enterprise communities service. Our analysis focuses on statistical patterns...
Michael Muller
ICMCS
2007
IEEE
183views Multimedia» more  ICMCS 2007»
15 years 11 months ago
Facial Expression Recognition using Encoded Dynamic Features
In this paper, we propose a new approach of facial expression recognition. In order to capture the temporal characteristic of facial expressions, we design dynamic haar-like featu...
Peng Yang, Qingshan Liu, Dimitris N. Metaxas
CHES
2007
Springer
115views Cryptology» more  CHES 2007»
15 years 11 months ago
Highly Regular Right-to-Left Algorithms for Scalar Multiplication
This papers introduces several binary scalar multiplication algorithms with applications to cryptography. Remarkably, the proposed algorithms regularly repeat the same pattern when...
Marc Joye