Sciweavers

2938 search results - page 60 / 588
» On obfuscating point functions
Sort
View
PRL
2007
180views more  PRL 2007»
13 years 9 months ago
Symmetric hash functions for secure fingerprint biometric systems
Securing biometrics databases from being compromised is one of the most important challenges that must be overcome in order to demonstrate the viability of biometrics based authen...
Sergey Tulyakov, Faisal Farooq, Praveer Mansukhani...
CONSTRAINTS
2008
138views more  CONSTRAINTS 2008»
13 years 10 months ago
Minimization of Locally Defined Submodular Functions by Optimal Soft Arc Consistency
Submodular function minimization is a polynomially-solvable combinatorial problem. Unfortunately the best known general-purpose algorithms have high-order polynomial time complexi...
Martin C. Cooper
TAPSOFT
1997
Springer
14 years 2 months ago
On the Complexity of Function Pointer May-Alias Analysis
This paper considers the complexity of interprocedural function pointer may-alias analysis, i.e., determining the set of functions that a function pointer (in a language such as C...
Robert Muth, Saumya K. Debray
DATE
2003
IEEE
84views Hardware» more  DATE 2003»
14 years 3 months ago
Dynamic Functional Unit Assignment for Low Power
A hardware method for functional unit assignment is presented, based on the principle that a functional unit’s power consumption is approximated by the switching activity of its...
Steve Haga, Natasha Reeves, Rajeev Barua, Diana Ma...
ICPR
2004
IEEE
14 years 11 months ago
Gaussian Energy Functions for Registration without Correspondences
A new criterion based on Gaussian fields is introduced and applied to the task of automatic rigid registration of point-sets. The method defines a simple energy function, which is...
Andreas Koschan, Besma R. Abidi, Faysal Boughorbel...