Sciweavers

1369 search results - page 169 / 274
» Lattice computations for random numbers
Sort
View
ICCV
2007
IEEE
14 years 11 months ago
A 3D Teacher for Car Detection in Aerial Images
This paper demonstrates how to reduce the hand labeling effort considerably by 3D information in an object detection task. In particular, we demonstrate how an efficient car detec...
Stefan Kluckner, Georg Pacher, Helmut Grabner, Hor...
RECOMB
2003
Springer
14 years 9 months ago
Transforming men into mice: the Nadeau-Taylor chromosomal breakage model revisited
Although analysis of genome rearrangements was pioneered by Dobzhansky and Sturtevant 65 years ago, we still know very little about the rearrangement events that produced the exis...
Pavel A. Pevzner, Glenn Tesler
DCC
2005
IEEE
14 years 8 months ago
When is Bit Allocation for Predictive Video Coding Easy?
This paper addresses the problem of bit allocation among frames in a predictively encoded video sequence. Finding optimal solutions to this problem potentially requires making an ...
Yegnaswamy Sermadevi, Jun Chen, Sheila S. Hemami, ...
PERVASIVE
2009
Springer
14 years 4 months ago
Securing RFID Systems by Detecting Tag Cloning
Cloning of RFID tags can lead to financial losses in many commercial RFID applications. There are two general strategies to provide security: prevention and detection. The securit...
Mikko Lehtonen, Daniel Ostojic, Alexander Ilic, Fl...
CRYPTO
2009
Springer
150views Cryptology» more  CRYPTO 2009»
14 years 3 months ago
Improving the Security of Quantum Protocols via Commit-and-Open
We consider two-party quantum protocols starting with a transmission of some random BB84 qubits followed by classical messages. We show a general “compiler” improving the secur...
Ivan Damgård, Serge Fehr, Carolin Lunemann, ...