Sciweavers

160 search results - page 4 / 32
» Homomorphism preservation theorems
Sort
View
ICMCS
2006
IEEE
191views Multimedia» more  ICMCS 2006»
14 years 1 months ago
Human Vision System Aware Exhaustive Block-Matching Algorithm
In this work, homomorphic image modeling is used to make the exhaustive block-matching algorithm (EBMA) more human vision system (HVS) aware, thus yielding visually pleasing seque...
David Lin, Paul Chau
CORR
2010
Springer
144views Education» more  CORR 2010»
13 years 7 months ago
Privacy-Preserving Protocols for Eigenvector Computation
Abstract. In this paper, we present a protocol for computing the principal eigenvector of a collection of data matrices belonging to multiple semi-honest parties with privacy const...
Manas A. Pathak, Bhiksha Raj
MLQ
2007
90views more  MLQ 2007»
13 years 7 months ago
Kripke submodels and universal sentences
We define two notions for intuitionistic predicate logic: that of a submodel of a Kripke model, and that of a universal sentence. We then prove a corresponding preservation theor...
Ben Ellison, Jonathan Fleischmann, Dan McGinn, Wim...
CEC
2005
IEEE
14 years 1 months ago
Linear equality constraints and homomorphous mappings in PSO
We present a homomorphous mapping that converts problems with linear equality constraints into fully unconstrained and lower-dimensional problems for optimization with PSO. This ap...
Christopher K. Monson, Kevin D. Seppi
IPL
2006
118views more  IPL 2006»
13 years 7 months ago
Easy intruder deduction problems with homomorphisms
We present complexity results for the verification of security protocols. Since the perfect cryptography assumption is unrealistic for cryptographic primitives with visible algebr...
Stéphanie Delaune