Sciweavers

1513 search results - page 157 / 303
» Cryptographic Pattern Matching
Sort
View
PKC
2010
Springer
118views Cryptology» more  PKC 2010»
14 years 10 days ago
Text Search Protocols with Simulation Based Security
This paper presents an efficient protocol for securely computing the fundamental problem of pattern matching. This problem is defined in the two-party setting, where party P1 hold...
Rosario Gennaro, Carmit Hazay, Jeffrey S. Sorensen
DAGSTUHL
1990
13 years 11 months ago
Integrating Rules and Connectionism for Robust Reasoning
A connectionist model for robust reasoning, CONSYDERR, is proposed to account for some common reasoning patterns found in commonsense reasoning and to remedy the brittleness probl...
Ron Sun
MVA
1990
133views Computer Vision» more  MVA 1990»
13 years 11 months ago
An Application of Optical Flow - Extraction of Facial Expression -
This report discusses a method that uses optical flow to estimate facial muscle movements which could then be recognized these movements as facial expressions. The. human face has...
Kenji Mase
PAAPP
2007
398views more  PAAPP 2007»
13 years 10 months ago
Counting people using video cameras
The paper is devoted to the problem of estimating the number of people visible in a camera. It uses as features a portion of foreground pixels in each cell of a rectangular grid. ...
Damian Roqueiro, Valery A. Petrushin

Book
594views
15 years 8 months ago
A Gentle Introduction to Haskell
The book covers the following topics: Values, Types, Functions, Case Expressions and Pattern Matching, Type Classes and Overloading, Input/Output, Standard Haskell Classes Monads,...
Paul Hudak, John Peterson, Joseph Fasel