Sciweavers

1585 search results - page 5 / 317
» Automatically optimizing secure computation
Sort
View
AVSS
2003
IEEE
14 years 1 months ago
Automatic Face Region Tracking for Highly Accurate Face Recognition in Unconstrained Environments
In this paper, we present a combined real-time face region tracking and highly accurate face recognition technique for an intelligent surveillance system. Highresolution face imag...
Young-Ouk Kim, Joon Ki Paik, Jingu Heo, Andreas Ko...
STACS
2007
Springer
14 years 1 months ago
On the Automatic Analysis of Recursive Security Protocols with XOR
Abstract. In many security protocols, such as group protocols, principals have to perform iterative or recursive computations. We call such protocols recursive protocols. Recently,...
Ralf Küsters, Tomasz Truderung
ASIACRYPT
2005
Springer
14 years 1 months ago
Upper Bounds on the Communication Complexity of Optimally Resilient Cryptographic Multiparty Computation
Abstract. We give improved upper bounds on the communication complexity of optimally-resilient secure multiparty computation in the cryptographic model. We consider evaluating an n...
Martin Hirt, Jesper Buus Nielsen
MIAR
2010
IEEE
13 years 6 months ago
Automatic Computation of Electrodes Trajectory for Deep Brain Stimulation
In this paper, we propose an approach to find the optimal position of an electrode, for assisting surgeons in planning Deep Brain Stimulation. We first show how we formalized the...
Caroline Essert, Claire Haegelen, Pierre Jannin