Sciweavers

2192 search results - page 408 / 439
» Embedded function composition
Sort
View
CRYPTO
2012
Springer
223views Cryptology» more  CRYPTO 2012»
11 years 10 months ago
Collusion-Preserving Computation
In collusion-free protocols, subliminal communication is impossible and parties are thus unable to communicate “any information beyond what the protocol allows”. Collusion-fre...
Joël Alwen, Jonathan Katz, Ueli Maurer, Vassi...
CVPR
2009
IEEE
1468views Computer Vision» more  CVPR 2009»
15 years 3 months ago
Hardware-Efficient Belief Propagation
Belief propagation (BP) is an effective algorithm for solving energy minimization problems in computer vision. However, it requires enormous memory, bandwidth, and computation beca...
Chao-Chung Cheng, Chia-Kai Liang, Homer H. Chen, L...
CVPR
2008
IEEE
14 years 9 months ago
Context and observation driven latent variable model for human pose estimation
Current approaches to pose estimation and tracking can be classified into two categories: generative and discriminative. While generative approaches can accurately determine human...
Abhinav Gupta, Trista Chen, Francine Chen, Don Kim...
POPL
2006
ACM
14 years 7 months ago
Specifying C++ concepts
C++ templates are key to the design of current successful mainstream libraries and systems. They are the basis of programming techniques in diverse areas ranging from conventional...
Gabriel Dos Reis, Bjarne Stroustrup
RECOMB
2003
Springer
14 years 7 months ago
Accurate detection of very sparse sequence motifs
Protein sequence alignments are more reliable the shorter the evolutionary distance. Here, we align distantly related proteins using many closely spaced intermediate sequences as ...
Andreas Heger, Michael Lappe, Liisa Holm