咨询与建议

限定检索结果

文献类型

  • 150 篇 会议
  • 110 篇 期刊文献
  • 2 册 图书

馆藏范围

  • 262 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 116 篇 工学
    • 77 篇 计算机科学与技术...
    • 58 篇 软件工程
    • 16 篇 信息与通信工程
    • 13 篇 控制科学与工程
    • 9 篇 机械工程
    • 9 篇 光学工程
    • 9 篇 生物工程
    • 8 篇 电气工程
    • 6 篇 力学(可授工学、理...
    • 6 篇 动力工程及工程热...
    • 6 篇 化学工程与技术
    • 5 篇 仪器科学与技术
    • 5 篇 生物医学工程(可授...
    • 4 篇 材料科学与工程(可...
    • 4 篇 航空宇航科学与技...
    • 4 篇 核科学与技术
    • 3 篇 电子科学与技术(可...
  • 108 篇 理学
    • 79 篇 数学
    • 24 篇 统计学(可授理学、...
    • 23 篇 物理学
    • 13 篇 系统科学
    • 11 篇 生物学
    • 6 篇 化学
  • 24 篇 管理学
    • 13 篇 管理科学与工程(可...
    • 10 篇 工商管理
    • 8 篇 图书情报与档案管...
  • 5 篇 教育学
    • 5 篇 教育学
  • 4 篇 经济学
    • 4 篇 应用经济学
  • 4 篇 法学
    • 3 篇 社会学
  • 4 篇 医学

主题

  • 48 篇 computer science
  • 9 篇 shape
  • 8 篇 cameras
  • 8 篇 mathematics
  • 8 篇 layout
  • 7 篇 application soft...
  • 7 篇 computational mo...
  • 7 篇 polynomials
  • 6 篇 video sequences
  • 5 篇 object detection
  • 5 篇 equations
  • 5 篇 mathematical mod...
  • 4 篇 lighting
  • 4 篇 data mining
  • 4 篇 algorithm design...
  • 4 篇 artificial intel...
  • 4 篇 testing
  • 4 篇 boundary conditi...
  • 4 篇 image reconstruc...
  • 4 篇 cryptography

机构

  • 21 篇 department of co...
  • 6 篇 department of co...
  • 5 篇 research centre ...
  • 5 篇 department of ap...
  • 4 篇 department of co...
  • 4 篇 department of co...
  • 4 篇 department of co...
  • 4 篇 department of ap...
  • 3 篇 department of ap...
  • 3 篇 department of ma...
  • 3 篇 laboratoire de m...
  • 3 篇 department of ma...
  • 3 篇 dept. of applied...
  • 3 篇 department of ap...
  • 3 篇 department of ap...
  • 3 篇 department of ma...
  • 3 篇 department of el...
  • 2 篇 school of comput...
  • 2 篇 applied math pro...
  • 2 篇 dept. of applied...

作者

  • 8 篇 naor moni
  • 8 篇 m. irani
  • 6 篇 krishnaswamy smi...
  • 6 篇 srivastava gauta...
  • 5 篇 irit dinur
  • 5 篇 evangelos a. the...
  • 5 篇 lin jerry chun-w...
  • 5 篇 u. feige
  • 5 篇 l. zelnik-manor
  • 4 篇 r. basri
  • 3 篇 tong alexander
  • 3 篇 emo todorov
  • 3 篇 feige u
  • 3 篇 wolf guy
  • 3 篇 uriel feige
  • 3 篇 ptak marek
  • 3 篇 huguet guillaume
  • 3 篇 nešetřil jarosla...
  • 3 篇 boscheri walter
  • 3 篇 dinur irit

语言

  • 256 篇 英文
  • 6 篇 其他
检索条件"机构=Department of Computer Science and Applied Math"
262 条 记 录,以下是191-200 订阅
排序:
Dense shape reconstruction of a moving object under arbitrary, unknown lighting
Dense shape reconstruction of a moving object under arbitrar...
收藏 引用
International Conference on computer Vision (ICCV)
作者: Simakov Frolova Basri Department of Computer Science and Applied Math Weizmann Institute of Science Rehovot Israel
We present a method for shape reconstruction from several images of a moving object. The reconstruction is dense (up to image resolution). The method assumes that the motion is known, e.g., by tracking a small number ... 详细信息
来源: 评论
Degeneracies, dependencies and their implications in multi-body and multi-sequence factorizations
Degeneracies, dependencies and their implications in multi-b...
收藏 引用
Conference on computer Vision and Pattern Recognition (CVPR)
作者: L. Zelnik-Manor M. Irani Department of Computer Science and Applied Math Weizmann Institute of Science Rehovot Israel
The body of work on multi-body factorization separates between objects whose motions are independent. In this work we show that in many cases objects moving with different 3D motions will be captured as a single objec... 详细信息
来源: 评论
Determining a scene's atmosphere by film grammar rules
Determining a scene's atmosphere by film grammar rules
收藏 引用
IEEE International Conference on Multimedia and Expo (ICME)
作者: A. Aner-Wolf Department of Computer Science and Applied Math Weizmann Institute of Science Rehovot Israel
A new approach for bridging over the semantic gap is presented. This approach is based solely on the extraction of low-level illumination features, and by using well defined film rules regarding scene lighting, it gen... 详细信息
来源: 评论
On the (In)security of the Fiat-Shamir paradigm
On the (In)security of the Fiat-Shamir paradigm
收藏 引用
Annual IEEE Symposium on Foundations of computer science
作者: S. Goldwasser Y.T. Kalai Department of Computer Science and Electrical Engineering Massachusetts Institute of Technology USA Department of Computer Science and Applied Math Weizmann Institute of Science Rehovot Israel
In 1986, Fiat and Shamir proposed a general method for transforming secure 3-round public-coin identification schemes into digital signature schemes. The idea of the transformation was to replace the random message of... 详细信息
来源: 评论
Direct methods for matrix Sylvester and Lyapunov equations
收藏 引用
Journal of applied mathematics 2003年 第6期2003卷 277-303页
作者: Sorensen, Danny C. Zhou, Yunkai Department of Computational and Applied Mathematics Rice University Houston TX 77005-1892 United States Department of Computational and Applied Mathematics Rice University Houston TX 77005-1892 United States Argonne National Laboratory Math and Computer Science Division Argonne IL 60439 United States
We revisit the two standard dense methods for matrix Sylvester and Lyapunov equations: The Bartels-Stewart method for A1X+XA2+D=0 and Hammarling's method for AX+XAT+BBT=0 with A stable. We construct three schemes ...
来源: 评论
A novel robust adaptive fuzzy controller
A novel robust adaptive fuzzy controller
收藏 引用
Proceedings of the 4th World Congress on Intelligent Control and Automation
作者: Liu, Xiaohua Wang, Xiuhong Fen, Enmin Dept. of Math. and Computer Science Yantai Normal University Yantai 264025 China Department of Applied Mathematics Dalian University of Technology Dalian 112064 China
For a class of continuous - time nonlinear system, a novel robust adaptive fuzzy controller is proposed by using of Lyapunov method. It is proven that the control algorithm is globally stable, the output tracking - er... 详细信息
来源: 评论
Arbitrary source models and Bayesian codebooks in rate-distortion theory
Arbitrary source models and Bayesian codebooks in rate-disto...
收藏 引用
IEEE International Symposium on Information Theory
作者: L. Kontoyiannis Junshan Zhang Division of Applied Math & Department of Computer Science Brown University USA Department of Electrical Engineering Arizona State University USA
We give a development of universal lossy data compression based on a lossy version of the Kraft inequality. As an application, we evaluate the performance of universal mixture codebooks.
来源: 评论
Asynchronous resource discovery in peer to peer networks
Asynchronous resource discovery in peer to peer networks
收藏 引用
Reliable Distributed Systems
作者: S. Kutten D. Peleg Faculty of Industrial Engineering & Management Technion-Israel Institute of Technology Haifa Israel Department of Computer Science and Applied Math Weizmann Institute of Science Rehovot Israel
The resource discovery problem arises in the context of peer to peer (P2P) networks, where at any point of time a peer may be placed at or removed from any location over a general purpose network (e.g., an Internet si... 详细信息
来源: 评论
Parallel coin-tossing and constant-round secure two-party computation
收藏 引用
21st Annual International Cryptology Conference, CRYPTO 2001
作者: Lindell, Yehuda Department of Computer Science and Applied Math Weizmann Institute of Science Rehovot Israel
In this paper we show that any two-party functionality canbe securely computed in a constant number of rounds, where security isobtained against malicious adversaries that may arbitrarily deviate fromthe protocol spec... 详细信息
来源: 评论
Session-key generation using human passwords only
收藏 引用
21st Annual International Cryptology Conference, CRYPTO 2001
作者: Goldreich, Oded Lindell, Yehuda Department of Computer Science and Applied Math Weizmann Institute of Science Rehovot Israel
We present session-key generation protocols in a model where the legitimate parties share only a human-memorizable password. The security guarantee holds with respect to probabilistic polynomial-time adversaries that ... 详细信息
来源: 评论