Sciweavers

1585 search results - page 143 / 317
» Automatically optimizing secure computation
Sort
View
STACS
2007
Springer
14 years 2 months ago
Associative-Commutative Deducibility Constraints
We consider deducibility constraints, which are equivalent to particular Diophantine systems, arising in the automatic verification of security protocols, in presence of associati...
Sergiu Bursuc, Hubert Comon-Lundh, Stéphani...
BMVC
2010
13 years 6 months ago
Object Recognition using 3D SIFT in Complex CT Volumes
The automatic detection of objects within complex volumetric imagery is becoming of increased interest due to the use of dual energy Computed Tomography (CT) scanners as an aviati...
Gregory T. Flitton, Toby P. Breckon, Najla Megherb...
3DPVT
2006
IEEE
224views Visualization» more  3DPVT 2006»
14 years 2 months ago
A Bayesian Approach to Building Footprint Extraction from Aerial LIDAR Data
Building footprints have been shown to be extremely useful in urban planning, infrastructure development, and roof modeling. Current methods for creating these footprints are ofte...
Oliver Wang, Suresh K. Lodha, David P. Helmbold
ICPR
2006
IEEE
14 years 9 months ago
Effective and Generic Structure from Motion using Angular Error
Generic camera modeling using raxels and associated methods was recently introduced in Computer Vision. The main advantage is the applicability for any camera model, which contras...
Maxime Lhuillier
GCC
2003
Springer
14 years 1 months ago
Information Grid Toolkit: Infrastructure of Shanghai Information Grid
A fundamental problem that confronts Shanghai Information Grid is to adopt a good Grid toolkit, since the “de facto” standard Globus Toolkit does not support Information Grid w...
Xinhua Lin, Qianni Deng, Xinda Lu