Sciweavers

798 search results - page 112 / 160
» Interval Methods: An Introduction
Sort
View
CTRSA
2009
Springer
127views Cryptology» more  CTRSA 2009»
14 years 2 months ago
Adaptive-ID Secure Revocable Identity-Based Encryption
Abstract. Identity-Based Encryption (IBE) offers an interesting alternative to PKI-enabled encryption as it eliminates the need for digital certificates. While revocation has bee...
Benoît Libert, Damien Vergnaud
FCCM
2009
IEEE
172views VLSI» more  FCCM 2009»
14 years 2 months ago
Evaluation of Static Analysis Techniques for Fixed-Point Precision Optimization
Abstract—Precision analysis and optimization is very important when transforming a floating-point algorithm into fixedpoint hardware implementations. The core analysis techniqu...
Jason Cong, Karthik Gururaj, Bin Liu, Chunyue Liu,...
ICARIS
2009
Springer
14 years 2 months ago
Exploration of the Dendritic Cell Algorithm Using the Duration Calculus
As one of the newest members in Artificial Immune Systems (AIS), the Dendritic Cell Algorithm (DCA) has been applied to a range of problems. These applications mainly belong to th...
Feng Gu, Julie Greensmith, Uwe Aickelin
ICPR
2008
IEEE
14 years 2 months ago
Adaptive selection of non-target cluster centers for K-means tracker
Hua et al. have proposed a stable and efficient tracking algorithm called “K-means tracker”[2, 3, 5]. This paper describes an adaptive non-target cluster center selection met...
Hiroshi Oike, Haiyuan Wu, Toshikazu Wada
WACV
2008
IEEE
14 years 2 months ago
Tracking Down Under: Following the Satin Bowerbird
Sociobiologists collect huge volumes of video to study animal behavior (our collaborators work with 30,000 hours of video). The scale of these datasets demands the development of ...
Aniruddha Kembhavi, Ryan Farrell, Yuancheng Luo, D...