Sciweavers

3497 search results - page 568 / 700
» Making Distributed Applications Robust
Sort
View
CRYPTO
2011
Springer
235views Cryptology» more  CRYPTO 2011»
14 years 4 months ago
Better Security for Deterministic Public-Key Encryption: The Auxiliary-Input Setting
Deterministic public-key encryption, introduced by Bellare, Boldyreva, and O’Neill (CRYPTO ’07), provides an alternative to randomized public-key encryption in various scenari...
Zvika Brakerski, Gil Segev
ICCV
2007
IEEE
16 years 6 months ago
The Best of Both Worlds: Combining 3D Deformable Models with Active Shape Models
Reliable 3D tracking is still a difficult task. Most parametrized 3D deformable models rely on the accurate extraction of image features for updating their parameters, and are pro...
Christian Vogler, Zhiguo Li, Atul Kanaujia, Siome ...
ECCV
2004
Springer
16 years 6 months ago
Camera Calibration from the Quasi-affine Invariance of Two Parallel Circles
Abstract. In this paper, a new camera calibration algorithm is proposed, which is from the quasi-affine invariance of two parallel circles. Two parallel circles here mean two circl...
Yihong Wu, Haijiang Zhu, Zhanyi Hu, Fuchao Wu
STOC
2001
ACM
104views Algorithms» more  STOC 2001»
16 years 5 months ago
Spatial gossip and resource location protocols
The dynamic behavior of a network in which information is changing continuously over time requires robust and efficient mechanisms for keeping nodes updated about new information. ...
David Kempe, Jon M. Kleinberg, Alan J. Demers
MOBILITY
2009
ACM
15 years 11 months ago
A membership management protocol for mobile P2P networks
MANETs are self-organizing networks composed of mobile wireless nodes with often scarce resources. Distributed applications based on the P2P paradigm are by nature good candidates...
Mohamed Karim Sbai, Emna Salhi, Chadi Barakat