Sciweavers

1451 search results - page 225 / 291
» Case Studies in Model Manipulation for Scientific Computing
Sort
View
PKC
2009
Springer
166views Cryptology» more  PKC 2009»
16 years 5 months ago
Security of Blind Signatures under Aborts
We explore the security of blind signatures under aborts where the user or the signer may stop the interactive signature issue protocol prematurely. Several works on blind signatur...
Dominique Schröder, Marc Fischlin
ICCV
2009
IEEE
16 years 9 months ago
The Dimensionality of Scene Appearance
Low-rank approximation of image collections (e.g., via PCA) is a popular tool in many areas of computer vision. Yet, surprisingly little is known justifying the observation that...
Rahul Garg, Hao Du, Steven M. Seitz, Noah Snavely
141
Voted
ICPR
2004
IEEE
16 years 5 months ago
From Massively Parallel Image Processors to Fault-Tolerant Nanocomputers
Parallel processors such as SIMD computers have been successfully used in various areas of high performance image and data processing. Due to their characteristics of highly regula...
Jie Han, Pieter Jonker
CHI
2006
ACM
16 years 4 months ago
GUESS: a language and interface for graph exploration
As graph models are applied to more widely varying fields, researchers struggle with tools for exploring and analyzing these structures. We describe GUESS, a novel system for grap...
Eytan Adar
AIIA
2005
Springer
15 years 10 months ago
Automata Slicing for Diagnosing Discrete-Event Systems with Partially Ordered Observations
Abstract. When dealing with real systems, it is unrealistic to suppose that observations can be totally ordered according to their emission dates. The partially ordered observation...
Alban Grastien, Marie-Odile Cordier, Christine Lar...