Sciweavers

429 search results - page 69 / 86
» Permutative Additives and Exponentials
Sort
View
AMFG
2007
IEEE
238views Biometrics» more  AMFG 2007»
13 years 11 months ago
Towards Pose-Invariant 2D Face Classification for Surveillance
A key problem for "face in the crowd" recognition from existing surveillance cameras in public spaces (such as mass transit centres) is the issue of pose mismatches betwe...
Conrad Sanderson, Ting Shan, Brian C. Lovell
CTRSA
2009
Springer
141views Cryptology» more  CTRSA 2009»
13 years 11 months ago
Practical Short Signature Batch Verification
In many applications, it is desirable to work with signatures that are both short, and yet where many messages from different signers be verified very quickly. RSA signatures sati...
Anna Lisa Ferrara, Matthew Green, Susan Hohenberge...
ICHIM
2001
121views more  ICHIM 2001»
13 years 9 months ago
From Dust to Stardust: A Collaborative 3D Virtual Museum of Computer Science
One of the outcomes of Moore's Law - according to which the exponential growth of technical advances in computer science is pushing more and more of our computers into obsole...
Thimoty Barbieri, Franca Garzotto, Giovanni Beltra...
CC
2007
Springer
123views System Software» more  CC 2007»
13 years 7 months ago
An Improved Analysis of Linear Mergers
Mergers are procedures that, with the aid of a short random string, transform k (possibly dependent) random sources into a single random source, in a way that ensures that if one ...
Zeev Dvir, Amir Shpilka
CORR
2011
Springer
243views Education» more  CORR 2011»
13 years 2 months ago
Deterministic Network Model Revisited: An Algebraic Network Coding Approach
Abstract—The capacity of multiuser networks has been a longstanding problem in information theory. Recently, Avestimehr et al. have proposed a deterministic network model to appr...
MinJi Kim, Elona Erez, Edmund M. Yeh, Muriel M&eac...