Sciweavers

5210 search results - page 921 / 1042
» Exact geometric computation
Sort
View
ASIACRYPT
2008
Springer
15 years 5 months ago
Strongly Multiplicative and 3-Multiplicative Linear Secret Sharing Schemes
Strongly multiplicative linear secret sharing schemes (LSSS) have been a powerful tool for constructing secure multi-party computation protocols. However, it remains open whether o...
Zhifang Zhang, Mulan Liu, Yeow Meng Chee, San Ling...
CIVR
2008
Springer
213views Image Analysis» more  CIVR 2008»
15 years 5 months ago
Language modeling for bag-of-visual words image categorization
In this paper, we propose two ways of improving image classification based on bag-of-words representation [25]. Two shortcomings of this representation are the loss of the spatial...
Pierre Tirilly, Vincent Claveau, Patrick Gros
BMVC
2000
15 years 5 months ago
Statistical Properties of the Hybrid Radon-Fourier Technique
The hybrid Radon-Fourier technique has been proposed for the discrimination and tracking of deforming and compound targets. The current work investigates the technique's uniq...
Violet F. Leavers
DAC
2010
ACM
15 years 4 months ago
Parallel multigrid preconditioning on graphics processing units (GPUs) for robust power grid analysis
Leveraging the power of nowadays graphics processing units for robust power grid simulation remains a challenging task. Existing preconditioned iterative methods that require inco...
Zhuo Feng, Zhiyu Zeng
ICASSP
2010
IEEE
15 years 4 months ago
Automatic matched filter recovery via the audio camera
The sound reaching the acoustic sensor in a realistic environment contains not only the part arriving directly from the sound source but also a number of environmental re ections....
Adam O'Donovan, Ramani Duraiswami, Dmitry N. Zotki...