Sciweavers

1068 search results - page 184 / 214
» Extremely randomized trees
Sort
View
EUROCRYPT
2004
Springer
14 years 2 months ago
Chosen-Ciphertext Security from Identity-Based Encryption
Abstract. We propose a simple and efficient construction of a CCAsecure public-key encryption scheme from any CPA-secure identity-based encryption (IBE) scheme. Our construction re...
Ran Canetti, Shai Halevi, Jonathan Katz
ICRA
2003
IEEE
134views Robotics» more  ICRA 2003»
14 years 2 months ago
Motion planning for a crowd of robots
- Moving a crowd of robots or avatars from their current configurations to some destination area without causing collisions is a challenging motion-planning problem because the hig...
Tsai-Yen Li, Hsu-Chi Chou
INFOCOM
2003
IEEE
14 years 2 months ago
A Novel Mechanism for Contention Resolution in HFC Networks
Abstract— The Medium Access Control (MAC) scheme proposed by DAVIC/DVB, IEEE 802.14 and DOCSIS for the upstream channel of Hybrid Fiber Coaxial (HFC) access networks is based on ...
Mark Van den Broek, Ivo J. B. F. Adan, Saishankar ...
DOCENG
2003
ACM
14 years 2 months ago
Lazy XSL transformations
We introduce a lazy XSLT interpreter that provides random access to the transformation result. This allows efficient pipelining of transformation sequences. Nodes of the result tr...
Steffen Schott, Markus L. Noga
ECCV
2010
Springer
14 years 1 months ago
SuperParsing: Scalable Nonparametric Image Parsing with Superpixels
This paper presents a simple and effective nonparametric approach to the problem of image parsing, or labeling image regions (in our case, superpixels produced by bottom-up segmen...