Sciweavers

604 search results - page 12 / 121
» Efficient Computation of Multiplicative Inverses for Cryptog...
Sort
View
ICIAP
2005
ACM
14 years 1 months ago
Real-Time 3D Hand Shape Estimation Based on Inverse Kinematics and Physical Constraints
We are researching for real-time hand shape estimation, which we are going to apply to user interface and interactive applications. We have employed a computer vision approach, sin...
Ryuji Fujiki, Daisaku Arita, Rin-ichiro Taniguchi
CCECE
2009
IEEE
14 years 2 months ago
Inverse data transformation for change detection in wind turbine diagnostics
A complex system is expected to show different nominal behaviors under different conditions, and the deviation over time from these nominal behaviors is an indicator of potential ...
Yanjun Yan, Lisa Ann Osadciw, Glen Benson, Eric Wh...
DCC
2005
IEEE
14 years 7 months ago
Hyperelliptic Curves with Compact Parameters
We present a family of hyperelliptic curves whose Jacobians are suitable for cryptographic use, and whose parameters can be specified in a highly efficient way. This is done via co...
Ezra Brown, Bruce T. Myers, Jerome A. Solinas
FC
2010
Springer
196views Cryptology» more  FC 2010»
13 years 8 months ago
Secure Computation with Fixed-Point Numbers
Abstract. Secure computation is a promising approach to business problems in which several parties want to run a joint application and cannot reveal their inputs. Secure computatio...
Octavian Catrina, Amitabh Saxena
TCSV
2002
78views more  TCSV 2002»
13 years 7 months ago
Local bandwidth constrained fast inverse motion compensation for DCT-domain video transcoding
DCT-based digital video coding standards such as MPEG and H.26x are becoming more widely adopted for multimedia applications. Since the standards differ in their format and syntax...
Shizhong Liu, Alan C. Bovik