Sciweavers

1268 search results - page 92 / 254
» One Logic to Use Them All
Sort
View
CVPR
2006
IEEE
15 years 1 days ago
Edge Suppression by Gradient Field Transformation Using Cross-Projection Tensors
We propose a new technique for edge-suppressing operations on images. We introduce cross projection tensors to achieve affine transformations of gradient fields. We use these tens...
Amit K. Agrawal, Ramesh Raskar, Rama Chellappa
ECCV
2006
Springer
14 years 12 months ago
Simultaneous Object Pose and Velocity Computation Using a Single View from a Rolling Shutter Camera
An original concept for computing instantaneous 3D pose and 3D velocity of fast moving objects using a single view is proposed, implemented and validated. It takes advantage of the...
Omar Ait-Aider, Nicolas Andreff, Jean-Marc Lavest,...
BMCBI
2007
100views more  BMCBI 2007»
13 years 10 months ago
Discovering structural motifs using a structural alphabet: Application to magnesium-binding sites
Background: For many metalloproteins, sequence motifs characteristic of metal-binding sites have not been found or are so short that they would not be expected to be metal-specifi...
Minko Dudev, Carmay Lim
DEXAW
2008
IEEE
121views Database» more  DEXAW 2008»
14 years 4 months ago
Experiences on Designing an Integral Intrusion Detection System
Network Intrusion Detection Systems (NIDS) have the challenge to prevent network attacks and unauthorised remote use of computers. In order to achieve this goal, NIDS usually foll...
Yoseba K. Penya, Pablo Garcia Bringas
CRYPTO
2003
Springer
101views Cryptology» more  CRYPTO 2003»
14 years 3 months ago
The Impact of Decryption Failures on the Security of NTRU Encryption
NTRUEncrypt is unusual among public-key cryptosystems in that, with standard parameters, validly generated ciphertexts can fail to decrypt. This affects the provable security prop...
Nick Howgrave-Graham, Phong Q. Nguyen, David Point...