Sciweavers

2125 search results - page 26 / 425
» Points with Type-2 Operations
Sort
View
IJNSEC
2006
94views more  IJNSEC 2006»
13 years 7 months ago
A Binary Redundant Scalar Point Multiplication in Secure Elliptic Curve Cryptosystems
The main back-bone operation in elliptic curve cryptosystems is scalar point multiplication. The most frequently used method implementing the scalar point multiplication which is ...
Sangook Moon
PAMI
2011
13 years 2 months ago
Rigid and Articulated Point Registration with Expectation Conditional Maximization
—This paper addresses the issue of matching rigid and articulated shapes through probabilistic point registration. The problem is recast into a missing data framework where unkno...
Radu Horaud, Florence Forbes, Manuel Yguel, Guilla...
ICPR
2006
IEEE
14 years 8 months ago
Singular point detection in fingerprints using quadrant change information
Automatic localization of singular points in fingerprints is of critical importance in many algorithms. Existing methods of detecting singular points often require tedious ad-hoc ...
Andrzej Drygajlo, Krzysztof Kryszczuk
ECCV
2008
Springer
14 years 9 months ago
An Efficient Dense and Scale-Invariant Spatio-Temporal Interest Point Detector
Over the years, several spatio-temporal interest point detectors have been proposed. While some detectors can only extract a sparse set of scaleinvariant features, others allow for...
Geert Willems, Tinne Tuytelaars, Luc J. Van Gool
ASAP
2005
IEEE
142views Hardware» more  ASAP 2005»
14 years 1 months ago
Decimal Floating-Point Square Root Using Newton-Raphson Iteration
With continued reductions in feature size, additional functionality may be added to future microprocessors to boost the performance of important application domains. Due to growth...
Liang-Kai Wang, Michael J. Schulte