Sciweavers

534 search results - page 43 / 107
» Power from Random Strings
Sort
View
113
Voted
CSFW
2011
IEEE
14 years 10 days ago
Local Memory via Layout Randomization
—Randomization is used in computer security as a tool to introduce unpredictability into the software infrastructure. In this paper, we study the use of randomization to achieve ...
Radha Jagadeesan, Corin Pitcher, Julian Rathke, Ja...
GRC
2008
IEEE
15 years 1 months ago
Effects of Varying the Delay Distribution in Random, Scale-free, and Small-world Networks
Graph-theory-based approaches have been used with great success when analyzing abstract properties of natural and artificial networks. However, these approaches have not factored...
Bum Soon Jang, Timothy Mann, Yoonsuck Choe
ECCV
2006
Springer
16 years 2 months ago
A Comparative Study of Energy Minimization Methods for Markov Random Fields
One of the most exciting advances in early vision has been the development of efficient energy minimization algorithms. Many early vision tasks require labeling each pixel with som...
Richard Szeliski, Ramin Zabih, Daniel Scharstein, ...
110
Voted
PAMI
2008
198views more  PAMI 2008»
15 years 14 days ago
A Comparative Study of Energy Minimization Methods for Markov Random Fields with Smoothness-Based Priors
Among the most exciting advances in early vision has been the development of efficient energy minimization algorithms for pixel-labeling tasks such as depth or texture computation....
Richard Szeliski, Ramin Zabih, Daniel Scharstein, ...
112
Voted
WAIFI
2007
Springer
127views Mathematics» more  WAIFI 2007»
15 years 6 months ago
The Quadratic Extension Extractor for (Hyper)Elliptic Curves in Odd Characteristic
We propose a simple and efficient deterministic extractor for the (hyper)elliptic curve C, defined over Fq2 , where q is some power of an odd prime. Our extractor, for a given poi...
Reza Rezaeian Farashahi, Ruud Pellikaan