Sciweavers

2746 search results - page 488 / 550
» Bisubmodular Function Minimization
Sort
View
ASIACRYPT
2009
Springer
14 years 4 days ago
Hedged Public-Key Encryption: How to Protect against Bad Randomness
Abstract. Public-key encryption schemes rely for their IND-CPA security on per-message fresh randomness. In practice, randomness may be of poor quality for a variety of reasons, le...
Mihir Bellare, Zvika Brakerski, Moni Naor, Thomas ...
ICPR
2010
IEEE
14 years 1 days ago
Extrinsic Camera Parameter Estimation Using Video Images and GPS Considering GPS Positioning Accuracy
Abstract--This paper proposes a method for estimating extrinsic camera parameters using video images and position data acquired by GPS. In conventional methods, the accuracy of the...
Hideyuki Kume, Takafumi Taketomi, Tomokazu Sato, N...
WSC
2008
13 years 11 months ago
A simulator to improve waiting times at a Medical Imaging Center
Medical Imaging Centers (MIC) are critical units in every hospital or medical center because they are an important step in generating a patient's diagnostic. This paper shows...
Francisco J. Ramis, Felipe F. Baesler, Edgar Berho...
WSC
2008
13 years 11 months ago
Automating the constraining process
The typical approach to finding minimum levels of resources that still allow support and operational performance goals to be met for military aircraft is based on a manual trial-a...
Joel J. Luna
ECCV
2010
Springer
13 years 10 months ago
Descriptor Learning for Efficient Retrieval
Many visual search and matching systems represent images using sparse sets of "visual words": descriptors that have been quantized by assignment to the best-matching symb...