Sciweavers

356 search results - page 13 / 72
» A computational approach to negative priming
Sort
View
COMPGEOM
2006
ACM
14 years 1 months ago
Complete subdivision algorithms, I: intersection of Bezier curves
We give the first complete subdivision algorithm for the intersection of two Bezier curves F, G, possibly with tangential intersections. Our approach to robust subdivision algori...
Chee-Keng Yap
ICDS
2009
IEEE
14 years 2 months ago
Local Contrast Segmentation to Binarize Images
—In this paper, a new binarization algorithm for degraded document images is proposed. The method is based on positive and negative pixel energies using the Laplacian of an image...
Marco Block, Raúl Rojas
PERCOM
2008
ACM
14 years 1 months ago
An Autonomic Context Management System for Pervasive Computing
Abstract—Context-aware applications adapt to changing computing environments or changing user circumstances/tasks. Context information that supports such adaptations is provided ...
Peizhao Hu, Jadwiga Indulska, Ricky Robinson
HICSS
2007
IEEE
93views Biometrics» more  HICSS 2007»
14 years 1 months ago
Making Sense of Stories: the development of a new mobile computer game
This paper analyzes the retrospective stories of a four person team responsible for developing a new computer game for mobile phones. Our theorizing is based on an in-depth, two y...
Patrick Stacey, Andrew Brown, Joe Nandhakumar
TCC
2009
Springer
184views Cryptology» more  TCC 2009»
14 years 8 months ago
Secure Arithmetic Computation with No Honest Majority
We study the complexity of securely evaluating arithmetic circuits over finite rings. This question is motivated by natural secure computation tasks. Focusing mainly on the case o...
Yuval Ishai, Manoj Prabhakaran, Amit Sahai