Sciweavers

12264 search results - page 2215 / 2453
» Analysis of the rubberband algorithm
Sort
View
BIOCOMP
2008
15 years 5 months ago
Improved Segmentation Based on Probabilistic Labeling
⎯This paper presents an improved multi-object segmentation algorithm based on probabilistic labeling. First, a critical look is focused on utilizing vector calculus operator and ...
Kai-Chieh Yang, Ming-Chi Jhuang, Chun-Shun Tseng, ...
ATAL
2010
Springer
15 years 5 months ago
Changing neighbours: improving tag-based cooperation
In systems of autonomous self-interested agents, in which agents' neighbourhoods are defined by their connections to others, cooperation can arise through observation of the ...
Nathan Griffiths, Michael Luck
CHES
2010
Springer
159views Cryptology» more  CHES 2010»
15 years 5 months ago
Provably Secure Higher-Order Masking of AES
Implementations of cryptographic algorithms are vulnerable to Side Channel Analysis (SCA). To counteract it, masking schemes are usually involved which randomize key-dependent data...
Matthieu Rivain, Emmanuel Prouff
CRYPTO
2010
Springer
157views Cryptology» more  CRYPTO 2010»
15 years 5 months ago
Oblivious RAM Revisited
We reinvestigate the oblivious RAM concept introduced by Goldreich and Ostrovsky, which enables a client, that can store locally only a constant amount of data, to store remotely ...
Benny Pinkas, Tzachy Reinman
CIIA
2009
15 years 5 months ago
LCF-style for Secure Verification Platform based on Multiway Decision Graphs
Abstract. Formal verification of digital systems is achieved, today, using one of two main approaches: states exploration (mainly model checking and equivalence checking) or deduct...
Sa'ed Abed, Otmane Aït Mohamed
« Prev « First page 2215 / 2453 Last » Next »