Sciweavers

5210 search results - page 921 / 1042
» Exact geometric computation
Sort
View
ASIACRYPT
2008
Springer
13 years 11 months ago
Strongly Multiplicative and 3-Multiplicative Linear Secret Sharing Schemes
Strongly multiplicative linear secret sharing schemes (LSSS) have been a powerful tool for constructing secure multi-party computation protocols. However, it remains open whether o...
Zhifang Zhang, Mulan Liu, Yeow Meng Chee, San Ling...
CIVR
2008
Springer
213views Image Analysis» more  CIVR 2008»
13 years 10 months ago
Language modeling for bag-of-visual words image categorization
In this paper, we propose two ways of improving image classification based on bag-of-words representation [25]. Two shortcomings of this representation are the loss of the spatial...
Pierre Tirilly, Vincent Claveau, Patrick Gros
BMVC
2000
13 years 10 months ago
Statistical Properties of the Hybrid Radon-Fourier Technique
The hybrid Radon-Fourier technique has been proposed for the discrimination and tracking of deforming and compound targets. The current work investigates the technique's uniq...
Violet F. Leavers
DAC
2010
ACM
13 years 9 months ago
Parallel multigrid preconditioning on graphics processing units (GPUs) for robust power grid analysis
Leveraging the power of nowadays graphics processing units for robust power grid simulation remains a challenging task. Existing preconditioned iterative methods that require inco...
Zhuo Feng, Zhiyu Zeng
ICASSP
2010
IEEE
13 years 9 months ago
Automatic matched filter recovery via the audio camera
The sound reaching the acoustic sensor in a realistic environment contains not only the part arriving directly from the sound source but also a number of environmental re ections....
Adam O'Donovan, Ramani Duraiswami, Dmitry N. Zotki...