Sciweavers

43264 search results - page 8552 / 8653
» Comparing models of computation
Sort
View
129
Voted
CIVR
2007
Springer
128views Image Analysis» more  CIVR 2007»
15 years 8 months ago
3D-Model search engine from photos
In this paper, we present the FOX-MIIRE 3D-Model Search Engine. Our search engine is based on Adaptive Views Vlustering (AVC) algorithm [4]. The AVC method uses statistical model ...
Tarik Filali Ansary, Jean-Philippe Vandeborre, Moh...
124
Voted
DCOSS
2007
Springer
15 years 8 months ago
Distributed Coalition Formation in Visual Sensor Networks: A Virtual Vision Approach
Abstract. We propose a distributed coalition formation strategy for collaborative sensing tasks in camera sensor networks. The proposed model supports taskdependent node selection ...
Faisal Qureshi, Demetri Terzopoulos
147
Voted
EMSOFT
2007
Springer
15 years 8 months ago
Loosely time-triggered architectures based on communication-by-sampling
We address the problem of mapping a set of processes which communicate synchronously on a distributed platform. The Time Triggered Architecture (TTA) proposed by Kopetz for the co...
Albert Benveniste, Paul Caspi, Marco Di Natale, Cl...
EUROCRYPT
2007
Springer
15 years 8 months ago
Atomic Secure Multi-party Multiplication with Low Communication
We consider the standard secure multi-party multiplication protocol due to M. Rabin. This protocol is based on Shamir’s secret sharing scheme and it can be viewed as a practical ...
Ronald Cramer, Ivan Damgård, Robbert de Haan
FC
2007
Springer
158views Cryptology» more  FC 2007»
15 years 8 months ago
Hidden Identity-Based Signatures
This paper introduces Hidden Identity-based Signatures (Hidden-IBS), a type of digital signatures that provide mediated signer-anonymity on top of Shamir’s Identity-based signat...
Aggelos Kiayias, Hong-Sheng Zhou
« Prev « First page 8552 / 8653 Last » Next »