Sciweavers

277 search results - page 8 / 56
» From Reversible to Irreversible Computations
Sort
View
TCC
2004
Springer
147views Cryptology» more  TCC 2004»
14 years 1 months ago
Computational Collapse of Quantum State with Application to Oblivious Transfer
Quantum 2-party cryptography differs from its classical counterpart in at least one important way: Given blak-box access to a perfect commitment scheme there exists a secure 1−2...
Claude Crépeau, Paul Dumais, Dominic Mayers...
ENGL
2008
97views more  ENGL 2008»
13 years 8 months ago
Hybrid Surface Reconstruction Technique for Automotive Applications
Reverse engineering has become a viable technique to create a 3D virtual model of an existing physical object. It enables the reconstruction of body surfaces to create a suitable C...
Gregory M. Lecrivain, Ian F. Kennedy, Arezki Slaou...
ICSE
1995
IEEE-ACM
13 years 12 months ago
Reverse Engineering of Legacy Code Exposed
— Reverse engineering of large legacy software systems generally cannot meet its objectives because it cannot be cost-effective. There are two main reasons for this. First, it is...
Bruce W. Weide, Wayne D. Heym, Joseph E. Hollingsw...
CORR
2006
Springer
98views Education» more  CORR 2006»
13 years 8 months ago
Reversal Complexity Revisited
We study a generalized version of reversal bounded Turing machines where, apart from several tapes on which the number of head reversals is bounded by r(n), there are several furth...
André Hernich, Nicole Schweikardt
CVPR
2012
IEEE
11 years 10 months ago
From pixels to physics: Probabilistic color de-rendering
Consumer digital cameras use tone-mapping to produce compact, narrow-gamut images that are nonetheless visually pleasing. In doing so, they discard or distort substantial radiomet...
Ying Xiong, Kate Saenko, Trevor Darrell, Todd Zick...