Sciweavers

247 search results - page 36 / 50
» Extracting All the Randomness from a Weakly Random Source
Sort
View
ICCV
2007
IEEE
14 years 9 months ago
Untangling Cycles for Contour Grouping
We introduce a novel topological formulation for contour grouping. Our grouping criterion, called untangling cycles, exploits the inherent topological 1D structure of salient cont...
Qihui Zhu, Gang Song, Jianbo Shi
ACCV
2009
Springer
13 years 8 months ago
Adaptive-Scale Robust Estimator Using Distribution Model Fitting
We propose a new robust estimator for parameter estimation in highly noisy data with multiple structures and without prior information on the noise scale of inliers. This is a diag...
Trung Ngo Thanh, Hajime Nagahara, Ryusuke Sagawa, ...
CVPR
2011
IEEE
13 years 3 months ago
A Global Sampling Method for Alpha Matting
Alpha matting refers to the problem of softly extracting the foreground from an image. Given a trimap (specifying known foreground/background and unknown pixels), a straightforwar...
Kaiming He, Christoph Rhemann, Carsten Rother, Xia...
EUROCRYPT
2010
Springer
14 years 10 days ago
Universal One-Way Hash Functions via Inaccessible Entropy
This paper revisits the construction of Universal One-Way Hash Functions (UOWHFs) from any one-way function due to Rompel (STOC 1990). We give a simpler construction of UOWHFs, whi...
Iftach Haitner, Thomas Holenstein, Omer Reingold, ...
PKC
2004
Springer
106views Cryptology» more  PKC 2004»
14 years 26 days ago
On the Security of Multiple Encryption or CCA-security+CCA-security=CCA-security?
In a practical system, a message is often encrypted more than once by different encryptions, here called multiple encryption, to enhance its security. Additionally, new features ...
Rui Zhang 0002, Goichiro Hanaoka, Junji Shikata, H...