Sciweavers

619 search results - page 61 / 124
» Random Bichromatic Matchings
Sort
View
TCC
2005
Springer
77views Cryptology» more  TCC 2005»
14 years 2 months ago
Upper and Lower Bounds on Black-Box Steganography
We study the limitations of steganography when the sender is not using any properties of the underlying channel beyond its entropy and the ability to sample from it. On the negati...
Nenad Dedic, Gene Itkis, Leonid Reyzin, Scott Russ...
HOTOS
2003
IEEE
14 years 2 months ago
An Analysis of Compare-by-hash
Recent research has produced a new and perhaps dangerous technique for uniquely identifying blocks that I will call compare-by-hash. Using this technique, we decide whether two bl...
Val Henson
ICDCS
2007
IEEE
14 years 22 days ago
Stratification in P2P Networks: Application to BitTorrent
We consider a model for decentralized collaborative networks that is based on stable matching theory. This model is applied to systems with a global ranking utility function, whic...
Anh-Tuan Gai, Fabien Mathieu, Fabien de Montgolfie...
CVPR
2011
IEEE
13 years 4 months ago
A Complete Statistical Inverse Ray Tracing Approach to Multi-view Stereo
This paper presents a complete solution to estimating a scene’s 3D geometry and appearance from multiple 2D images by using a statistical inverse ray tracing method. Instead of ...
Shubao Liu, David Cooper
CVPR
2011
IEEE
13 years 19 days ago
Registration of Camera Captured Documents Under Non-rigid Deformation
Document registration is a problem where the image of a template document whose layout is known is registered with a test document image. Given the registration parameters, layout...
Venkata Edupuganti, Suryaprakash Kompalli, Vinayak...