Sciweavers

2436 search results - page 358 / 488
» Comonadic Notions of Computation
Sort
View
ICALP
2007
Springer
15 years 10 months ago
Succinct Ordinal Trees Based on Tree Covering
Abstract. Various methods have been used to represent a tree on n nodes in essentially the informationtheoretic minimum space while supporting various navigational operations in co...
Meng He, J. Ian Munro, S. Srinivasa Rao
OTM
2007
Springer
15 years 10 months ago
Bayesian Analysis of Secure P2P Sharing Protocols
Ad hoc and peer-to-peer (P2P) computing paradigms pose a number of security challenges. The deployment of classic security protocols to provide services such as node authentication...
Esther Palomar, Almudena Alcaide, Juan M. Est&eacu...
WAW
2007
Springer
120views Algorithms» more  WAW 2007»
15 years 10 months ago
Manipulation-Resistant Reputations Using Hitting Time
Popular reputation systems for linked networks can be manipulated by spammers who strategically place links. The reputation of node v is interpreted as the world’s opinion of v...
John E. Hopcroft, Daniel Sheldon
3DPVT
2006
IEEE
155views Visualization» more  3DPVT 2006»
15 years 10 months ago
The Reverse Projection Correlation Principle for Depth from Defocus
In this paper, we address the problem of finding depth from defocus in a fundamentally new way. Most previous methods have used an approximate model in which blurring is shift in...
Scott McCloskey, Michael S. Langer, Kaleem Siddiqi
3DPVT
2006
IEEE
203views Visualization» more  3DPVT 2006»
15 years 10 months ago
A Factorization Based Self-Calibration for Radially Symmetric Cameras
The paper proposes a novel approach for planar selfcalibration of radially symmetric cameras. We model these camera images using notions of distortion center and concentric distor...
Srikumar Ramalingam, Peter F. Sturm, Edmond Boyer