Sciweavers

411 search results - page 53 / 83
» Extracting Temporal Information from Short Messages
Sort
View
STOC
2009
ACM
145views Algorithms» more  STOC 2009»
14 years 8 months ago
Non-malleable extractors and symmetric key cryptography from weak secrets
We study the question of basing symmetric key cryptography on weak secrets. In this setting, Alice and Bob share an n-bit secret W, which might not be uniformly random, but the ad...
Yevgeniy Dodis, Daniel Wichs
IJIT
2004
13 years 8 months ago
Computing Entropy for Ortholog Detection
Abstract-- Biological sequences from different species are called orthologs if they evolved from a sequence of a common ancestor species and they have the same biological function....
Hsing-Kuo Pao, John Case
VMV
2004
167views Visualization» more  VMV 2004»
13 years 8 months ago
GPU-PIV
Digital Particle Image Velocimetry (PIV) is an optical technique used to measure the velocity of seeded particles in real flow. A CCD camera captures the flow field twice under ex...
Thomas Schiwietz, Rüdiger Westermann
ICIP
2004
IEEE
14 years 9 months ago
Water video analysis
Many image processing and computer vision applications have difficulty dealing with a nonstatic background such as water waves, but this particular dynamic scene actually contains...
Lisa Spencer, Mubarak Shah
ICPR
2002
IEEE
14 years 8 months ago
A Bayesian Approach to Video Object Segmentation via Merging 3D Watershed Volumes
In this paper, we propose a Bayesian approach to video object segmentation. Our method consists of two stages. In the first stage, we partition the video data into a set of 3D wate...
Yi-Ping Hung, Yu-Pao Tsai, Chih-Chuan Lai