Sciweavers

1301 search results - page 182 / 261
» Bounded Version Vectors
Sort
View
CANS
2009
Springer
164views Cryptology» more  CANS 2009»
14 years 5 months ago
Extensions of the Cube Attack Based on Low Degree Annihilators
At Crypto 2008, Shamir introduced a new algebraic attack called the cube attack, which allows us to solve black-box polynomials if we are able to tweak the inputs by varying an ini...
Aileen Zhang, Chu-Wee Lim, Khoongming Khoo, Lei We...
EMMCVPR
2009
Springer
14 years 5 months ago
Detection and Segmentation of Independently Moving Objects from Dense Scene Flow
We present an approach for identifying and segmenting independently moving objects from dense scene flow information, using a moving stereo camera system. The detection and segmen...
Andreas Wedel, Annemarie Meißner, Clemens Ra...
AVSS
2007
IEEE
14 years 4 months ago
Experiments with patch-based object classification
We present and experiment with a patch-based algorithm for the purpose of object classification in video surveillance. A feature vector is calculated based on template matching o...
Rob G. J. Wijnhoven, Peter H. N. de With
HICSS
2007
IEEE
137views Biometrics» more  HICSS 2007»
14 years 4 months ago
Essential Dimensions of Latent Semantic Indexing (LSI)
Latent Semantic Indexing (LSI) is commonly used to match queries to documents in information retrieval applications. LSI has been shown to improve retrieval performance for some, ...
April Kontostathis
AAECC
2007
Springer
89views Algorithms» more  AAECC 2007»
14 years 4 months ago
Links Between Discriminating and Identifying Codes in the Binary Hamming Space
Let Fn be the binary n-cube, or binary Hamming space of dimension n, endowed with the Hamming distance, and En (respectively, On ) the set of vectors with even (respectively, odd)...
Irène Charon, Gérard D. Cohen, Olivi...