Sciweavers

2702 search results - page 478 / 541
» Message from the Editor
Sort
View
IACR
2011
89views more  IACR 2011»
12 years 8 months ago
Identity-Based Decryption
Identity-based decryption is an alternative to identity-based encryption, in which Alice encrypts a symmetric key for Bob under a trusted authority’s public key. Alice sends Bob...
Daniel R. L. Brown
CVPR
2009
IEEE
15 years 1 months ago
Distributed Volumetric Scene Geometry Reconstruction With a Network of Distributed Smart Cameras
Central to many problems in scene understanding based on using a network of tens, hundreds or even thousands of randomly distributed cameras with on-board processing and wireless c...
Shubao Liu, Kongbin Kang, Jean-Philippe Tarel and ...
CVPR
2008
IEEE
14 years 11 months ago
Reduce, reuse & recycle: Efficiently solving multi-label MRFs
In this paper, we present novel techniques that improve the computational and memory efficiency of algorithms for solving multi-label energy functions arising from discrete MRFs o...
Karteek Alahari, Pushmeet Kohli, Philip H. S. Torr
ICDE
2009
IEEE
140views Database» more  ICDE 2009»
14 years 10 months ago
Predicting Multiple Metrics for Queries: Better Decisions Enabled by Machine Learning
One of the most challenging aspects of managing a very large data warehouse is identifying how queries will behave before they start executing. Yet knowing their performance charac...
Archana Ganapathi, Harumi A. Kuno, Umeshwar Dayal,...
WWW
2009
ACM
14 years 9 months ago
Social search in "Small-World" experiments
The "algorithmic small-world hypothesis" states that not only are pairs of individuals in a large social network connected by short paths, but that ordinary individuals ...
Sharad Goel, Roby Muhamad, Duncan J. Watts