Sciweavers

2938 search results - page 41 / 588
» On obfuscating point functions
Sort
View
EUROPAR
2004
Springer
13 years 11 months ago
Enhancing Efficiency of Byzantine-Tolerant Coordination Protocols via Hash Functions
Abstract. Distributed protocols resilient to Byzantine failures are notorious to be costly from the computational and communication point of view. In this paper we discuss the role...
Daniela Tulone
JAT
2006
89views more  JAT 2006»
13 years 7 months ago
Continuous and discrete least-squares approximation by radial basis functions on spheres
In this paper we discuss Sobolev bounds on functions that vanish at scattered points on the n-sphere Sn in
Quoc Thong Le Gia, Francis J. Narcowich, Joseph D....
APPML
2005
52views more  APPML 2005»
13 years 7 months ago
New bounds for the Cebysev functional
Some new inequalities for the Cebysev functional in terms of the first derivative and applications for Taylor's expansion and generalised trapezoid formula are pointed out.
Pietro Cerone, Sever Silvestru Dragomir
ICPR
2010
IEEE
13 years 11 months ago
Pattern Recognition Using Functions of Multiple Instances
The Functions of Multiple Instances (FUMI) method for learning a target prototype from data points that are functions of target and non-target prototypes is introduced. In this pa...
Alina Zare, Paul Gader
BMVC
2000
13 years 9 months ago
The Cross Ratio: A Revisit to its Probability Density Function
The cross ratio has wide applications in computer vision because of its invariance under projective transformation. In active vision where the projections of quadruples of colline...
D. Q. Huynh