Sciweavers

1190 search results - page 29 / 238
» Scalable Active Matching
Sort
View
CRYPTO
2008
Springer
76views Cryptology» more  CRYPTO 2008»
13 years 9 months ago
Scalable Multiparty Computation with Nearly Optimal Work and Resilience
We present the first general protocol for secure multiparty computation in which the total amount of work required by n players to compute a function f grows only polylogarithmical...
Ivan Damgård, Yuval Ishai, Mikkel Krø...
ICPR
2000
IEEE
14 years 8 months ago
Epipolar Geometry from the Deformation of an Active Contour
An active contour is used to track a target in a sequence recorded by a walking robot in an unstructured scene . The deformations of the contour are analysed in order to extract t...
Elisa Martínez, Carme Torras
ISCAS
2003
IEEE
124views Hardware» more  ISCAS 2003»
14 years 1 months ago
An active leakage-injection scheme applied to low-voltage SRAMs
ABSTRACT: An active leakage-injection scheme (ALIS) for lowvoltage (LV) high-density (HD) SRAMs is presented. By means of a feedback loop comprising a servo-amplifier and a commond...
Jader A. De Lima
BMVC
2002
13 years 10 months ago
Comparing Variations on the Active Appearance Model Algorithm
The Active Appearance Model (AAM) algorithm has proved to be a successful method for matching statistical models of appearance to new images. Since the original algorithm was desc...
Timothy F. Cootes, Panachit Kittipanya-ngam
ICCS
2005
Springer
14 years 1 months ago
Highly Scalable Algorithms for Robust String Barcoding
: String barcoding is a recently introduced technique for genomic based identification of microorganisms. In this paper we describe the engineering of highly scalable algorithms fo...
Bhaskar DasGupta, Kishori M. Konwar, Ion I. Mandoi...