Sciweavers

210 search results - page 37 / 42
» A Model-Based Method For Building Reconstruction
Sort
View
IMA
2005
Springer
126views Cryptology» more  IMA 2005»
14 years 1 months ago
Security Proof of Sakai-Kasahara's Identity-Based Encryption Scheme
Abstract. Identity-based encryption (IBE) is a special asymmetric encryption method where a public encryption key can be an arbitrary identifier and the corresponding private decr...
Liqun Chen, Zhaohui Cheng
ROBOCUP
2004
Springer
106views Robotics» more  ROBOCUP 2004»
14 years 27 days ago
Predicting Opponent Actions by Observation
In competitive domains, the knowledge about the opponent can give players a clear advantage. This idea lead us in the past to propose an approach to acquire models of opponents, ba...
Agapito Ledezma, Ricardo Aler, Araceli Sanch&iacut...
MM
2009
ACM
133views Multimedia» more  MM 2009»
14 years 7 days ago
Friend recommendation according to appearances on photos
Unlike the questionnaire based friend recommendation scheme used in Social Network Service (SNS) websites nowadays (e.g. online dating sites, online matchmaking sites), we focus o...
Zhipeng Wu, Shuqiang Jiang, Qingming Huang
SDM
2004
SIAM
242views Data Mining» more  SDM 2004»
13 years 9 months ago
Privacy-Preserving Multivariate Statistical Analysis: Linear Regression and Classification
Multivariate statistical analysis is an important data analysis technique that has found applications in various areas. In this paper, we study some multivariate statistical analy...
Wenliang Du, Yunghsiang S. Han, Shigang Chen
ECCV
2010
Springer
14 years 27 days ago
3D Point Correspondence by Minimum Description Length in Feature Space
Abstract. Finding point correspondences plays an important role in automatically building statistical shape models from a training set of 3D surfaces. For the point correspondence ...