Sciweavers

3190 search results - page 19 / 638
» cans 2011
Sort
View
JITT
2011
177views more  JITT 2011»
14 years 4 months ago
Mobile Recommender Systems
Mobile phones are becoming a primary platform for information access and when coupled with recommender systems technologies they can become key tools for mobile users both for lei...
Francesco Ricci
JMIV
2011
135views more  JMIV 2011»
14 years 4 months ago
Periodic Plus Smooth Image Decomposition
When the Discrete Fourier Transform of an image is computed, the image is implicitly assumed to be periodic. Since there is no reason for opposite borders to be alike, the “peri...
Lionel Moisan
JOC
2011
102views more  JOC 2011»
14 years 4 months ago
Wildcarded Identity-Based Encryption
In this paper we introduce a new primitive called identity-based encryption with wildcards, or WIBE for short. It allows a sender to encrypt messages to a whole range of receivers ...
Michel Abdalla, James Birkett, Dario Catalano, Ale...
NFM
2011
264views Formal Methods» more  NFM 2011»
14 years 4 months ago
Applying Atomicity and Model Decomposition to a Space Craft System in Event-B
Abstract. Event-B is a formal method for modeling and verifying consistency of systems. In formal methods such as Event-B, refinement is the process of enriching or modifying an a...
Asieh Salehi Fathabadi, Abdolbaghi Rezazadeh, Mich...
70
Voted
TIP
2011
106views more  TIP 2011»
14 years 4 months ago
Practical Bounds on Image Denoising: From Estimation to Information
—Recently, in a previous work, we proposed a way to bound how well any given image can be denoised. The bound was computed directly from the noise-free image that was assumed to ...
Priyam Chatterjee, Peyman Milanfar