Sciweavers

850 search results - page 163 / 170
» Constraint propagation on quadratic constraints
Sort
View
EUROCRYPT
2010
Springer
14 years 8 days ago
Public-Key Encryption in the Bounded-Retrieval Model
We construct the first public-key encryption scheme in the Bounded-Retrieval Model (BRM), providing security against various forms of adversarial “key leakage” attacks. In th...
Joël Alwen, Yevgeniy Dodis, Moni Naor, Gil Se...
SIAMIS
2008
174views more  SIAMIS 2008»
13 years 7 months ago
Efficient Reconstruction of Piecewise Constant Images Using Nonsmooth Nonconvex Minimization
We consider the restoration of piecewise constant images where the number of the regions and their values are not fixed in advance, with a good difference of piecewise constant val...
Mila Nikolova, Michael K. Ng, Shuqin Zhang, Wai-Ki...
CG
2005
Springer
13 years 7 months ago
Sketch-based free-form shape modelling with a fast and stable numerical engine
In this paper, we present a feature-based free-form shape modelling technique based on solving a fundamental problem of reconstructing the depth information from 2D sketch planes....
Yong-Jin Liu, Kai Tang, Ajay Joneja
SDM
2011
SIAM
232views Data Mining» more  SDM 2011»
12 years 10 months ago
A Sequential Dual Method for Structural SVMs
In many real world prediction problems the output is a structured object like a sequence or a tree or a graph. Such problems range from natural language processing to computationa...
Shirish Krishnaj Shevade, Balamurugan P., S. Sunda...
INFOCOM
2012
IEEE
11 years 10 months ago
Spectrum management and power allocation in MIMO cognitive networks
Cognitive radio (CR) techniques improve the spectrum utilization by exploiting temporarily-free frequency bands (i.e., in the time domain). The spectrum utilization can be boosted...
Diep N. Nguyen, Marwan Krunz