Sciweavers

61 search results - page 3 / 13
» Q-adic Transform revisited
Sort
View
PKC
2010
Springer
119views Cryptology» more  PKC 2010»
13 years 10 months ago
Efficient Set Operations in the Presence of Malicious Adversaries
We revisit the problem of constructing efficient secure two-party protocols for the problems of setintersection and set-union, focusing on the model of malicious parties. Our main...
Carmit Hazay, Kobbi Nissim
CORR
2010
Springer
108views Education» more  CORR 2010»
13 years 6 months ago
Affine Invariant, Model-Based Object Recognition Using Robust Metrics and Bayesian Statistics
We revisit the problem of model-based object recognition for intensity images and attempt to address some of the shortcomings of existing Bayesian methods, such as unsuitable prior...
Vasileios Zografos, Bernard F. Buxton
CGO
2010
IEEE
14 years 3 months ago
Parameterized tiling revisited
Tiling, a key transformation for optimizing programs, has been widely studied in literature. Parameterized tiled code is important for auto-tuning systems since they often execute...
Muthu Manikandan Baskaran, Albert Hartono, Sanket ...
ECCV
2006
Springer
14 years 6 days ago
Trace Quotient Problems Revisited
The formulation of trace quotient is shared by many computer vision problems; however, it was conventionally approximated by an essentially different formulation of quotient trace,...
Shuicheng Yan, Xiaoou Tang
ENTCS
2008
97views more  ENTCS 2008»
13 years 8 months ago
Termination of Lazy Rewriting Revisited
Lazy rewriting is a proper restriction of term rewriting that dynamically restricts the reduction of certain arguments of functions in order to obtain termination. In contrast to ...
Felix Schernhammer, Bernhard Gramlich