41![Efficient Maximum Appearance Search for Large-Scale Object Detection Qiang Chen1 , Zheng Song1 , Rogerio Feris2 , Ankur Datta2 , Liangliang Cao2 , Zhongyang Huang3 , Shuicheng Yan1 1 National University of Singapore, S Efficient Maximum Appearance Search for Large-Scale Object Detection Qiang Chen1 , Zheng Song1 , Rogerio Feris2 , Ankur Datta2 , Liangliang Cao2 , Zhongyang Huang3 , Shuicheng Yan1 1 National University of Singapore, S](https://www.pdfsearch.io/img/4a2a60d2d8ddff1d625d332fa9a85d20.jpg) | Add to Reading ListSource URL: rogerioferis.comLanguage: English - Date: 2013-04-15 03:39:48
|
---|
42![Verification of Timed Erlang/OTP Components Using the Process Algebra µCRL Qiang Guo and John Derrick Department of Computer Science, The University of Sheffield, Verification of Timed Erlang/OTP Components Using the Process Algebra µCRL Qiang Guo and John Derrick Department of Computer Science, The University of Sheffield,](https://www.pdfsearch.io/img/85e198a36dba86982fe72ef7d7f965e8.jpg) | Add to Reading ListSource URL: www.erlang.seLanguage: English - Date: 2007-10-10 14:12:27
|
---|
43![A scheme of optical network for quantum cryptography based on wavelength division multiplexing Hai-Qiang Ma, Rui-Xue Li, Ke-Jin Wei, Hong-Wei Liu and Zhu Wu School of Science and State Key Laboratory of Information Photo A scheme of optical network for quantum cryptography based on wavelength division multiplexing Hai-Qiang Ma, Rui-Xue Li, Ke-Jin Wei, Hong-Wei Liu and Zhu Wu School of Science and State Key Laboratory of Information Photo](https://www.pdfsearch.io/img/68d6e751715ad99b466c17198514627d.jpg) | Add to Reading ListSource URL: 2015.qcrypt.netLanguage: English - Date: 2015-09-22 01:52:45
|
---|
44![Fast implementation of privacy amplification in quantum key distribution Chun-Mei Zhang1,2 , Chao Wang1,2 , Mo Li1,2 , Hong-Wei Li1,2 , Zhen-Qiang Yin1,2 , Wei Chen1,2 , Zhen-Fu Han1,2 1 Fast implementation of privacy amplification in quantum key distribution Chun-Mei Zhang1,2 , Chao Wang1,2 , Mo Li1,2 , Hong-Wei Li1,2 , Zhen-Qiang Yin1,2 , Wei Chen1,2 , Zhen-Fu Han1,2 1](https://www.pdfsearch.io/img/3399334730feec61e4286229d44deb78.jpg) | Add to Reading ListSource URL: 2015.qcrypt.netLanguage: English - Date: 2015-09-22 01:45:44
|
---|
45![Trapdoor Privacy in Asymmetric Searchable Encryption Schemes Afonso Arriaga1 , Qiang Tang1 , and Peter Ryan1 SnT, University of Luxembourg {afonso.delerue,qiang.tang,peter.ryan}@uni.lu Abstract. Asymmetric searchable en Trapdoor Privacy in Asymmetric Searchable Encryption Schemes Afonso Arriaga1 , Qiang Tang1 , and Peter Ryan1 SnT, University of Luxembourg {afonso.delerue,qiang.tang,peter.ryan}@uni.lu Abstract. Asymmetric searchable en](https://www.pdfsearch.io/img/12a17ec1ee26cc4533d74248b5b499cb.jpg) | Add to Reading ListSource URL: www2.imm.dtu.dkLanguage: English - Date: 2014-03-13 15:47:35
|
---|
46![Deep Domain Adaptation for Describing People Based on Fine-Grained Clothing Attributes Qiang Chen1∗ , Junshi Huang3∗ , Rogerio Feris2 , Lisa M Brown2 , Jian Dong3 ,Shuicheng Yan3 1 IBM Research, Australia, 2 IBM T.J Deep Domain Adaptation for Describing People Based on Fine-Grained Clothing Attributes Qiang Chen1∗ , Junshi Huang3∗ , Rogerio Feris2 , Lisa M Brown2 , Jian Dong3 ,Shuicheng Yan3 1 IBM Research, Australia, 2 IBM T.J](https://www.pdfsearch.io/img/9f8a9b9b1e893f25aab6f21220280bc5.jpg) | Add to Reading ListSource URL: rogerioferis.comLanguage: English - Date: 2015-04-11 18:48:38
|
---|
47![Cardigan: Deploying a Distributed Routing Fabric Jonathan Philip Stringer, Qiang Fu Christopher Lorier, Richard Nelson Cardigan: Deploying a Distributed Routing Fabric Jonathan Philip Stringer, Qiang Fu Christopher Lorier, Richard Nelson](https://www.pdfsearch.io/img/5c9eca7e43001ad203fe9dbe0182fb05.jpg) | Add to Reading ListSource URL: conferences.sigcomm.orgLanguage: English - Date: 2013-07-08 16:41:08
|
---|
48![Accepted Papers LatinCrypt 2014 On Key Recovery Attacks against Existing Somewhat Homomorphic Encryption Schemes Massimo Chenal, Qiang Tang Accepted Papers LatinCrypt 2014 On Key Recovery Attacks against Existing Somewhat Homomorphic Encryption Schemes Massimo Chenal, Qiang Tang](https://www.pdfsearch.io/img/de65dcf582f5613012addc53e8ab230f.jpg) | Add to Reading ListSource URL: latincrypt2014.labsec.ufsc.brLanguage: English - Date: 2014-08-27 15:24:45
|
---|
49![Enabling Elastic Content Payload in Content-Centric Networking Aytac Azgin, Ravi Ravindran, Asit Chakraborti, and Guo-Qiang Wang Huawei Research Center 1 Enabling Elastic Content Payload in Content-Centric Networking Aytac Azgin, Ravi Ravindran, Asit Chakraborti, and Guo-Qiang Wang Huawei Research Center 1](https://www.pdfsearch.io/img/8c891ed890e49a139f409d1ab2fe5370.jpg) | Add to Reading ListSource URL: www.ccnx.orgLanguage: English - Date: 2015-05-20 16:46:17
|
---|
50![Experimental Passive Round-Robin Differential Phase-Shift Quantum Key Distribution Jian-Yu Guan,1,2 Zhu Cao,3 Yang Liu,1,2 Guo-Liang Shen-Tu,1,2 Jason S. Pelc,4 M. M. Fejer,4 Cheng-Zhi Peng,1,2 Xiongfeng Ma,3,* Qiang Zha Experimental Passive Round-Robin Differential Phase-Shift Quantum Key Distribution Jian-Yu Guan,1,2 Zhu Cao,3 Yang Liu,1,2 Guo-Liang Shen-Tu,1,2 Jason S. Pelc,4 M. M. Fejer,4 Cheng-Zhi Peng,1,2 Xiongfeng Ma,3,* Qiang Zha](https://www.pdfsearch.io/img/37886b0f2473206bbd685841dc159c69.jpg) | Add to Reading ListSource URL: 2015.qcrypt.netLanguage: English - Date: 2015-09-22 01:52:33
|
---|