Sciweavers

1730 search results - page 253 / 346
» Algebra and Computation
Sort
View
108
Voted
IJCV
2008
105views more  IJCV 2008»
15 years 3 months ago
Detecting and Handling Unreliable Points for Camera Parameter Estimation
The popularly used DLT method sometimes fails to give reliable camera parameter estimation. It is therefore important to detect the unreliability and provide the corresponding solu...
Yihong Wu, Youfu Li, Zhanyi Hu
112
Voted
FGCS
2006
83views more  FGCS 2006»
15 years 3 months ago
Memory-efficient Kronecker algorithms with applications to the modelling of parallel systems
We present a new algorithm for computing the solution of large Markov chain models whose generators can be represented in the form of a generalized tensor algebra, such as network...
Anne Benoit, Brigitte Plateau, William J. Stewart
133
Voted
IJNSEC
2008
147views more  IJNSEC 2008»
15 years 3 months ago
Constructing Efficient Certificateless Public Key Encryption with Pairing
Certificateless public key cryptography was introduced to overcome the key escrow limitation of the identity-based cryptography. Recently, Yum1 and Lee have proposed a generic ser...
Yijuan Shi, Jianhua Li, Jianjun Shi
SIAMJO
2008
93views more  SIAMJO 2008»
15 years 3 months ago
Recursive Trust-Region Methods for Multiscale Nonlinear Optimization
A class of trust-region methods is presented for solving unconstrained nonlinear and possibly nonconvex discretized optimization problems, like those arising in systems governed by...
Serge Gratton, Annick Sartenaer, Philippe L. Toint
120
Voted
IJFCS
2007
93views more  IJFCS 2007»
15 years 3 months ago
Modelling and Analysis of PKI-Based Systems Using Process Calculi
In this technical report, we present a process algebra aimed at modelling PKI-based systems. The new language, SPIKY, extends the spi-calculus by adding primitives for the retriev...
Benjamin Aziz, Geoff Hamilton