Sciweavers

262 search results - page 5 / 53
» Secure Hamming Distance Based Computation and Its Applicatio...
Sort
View
BMCBI
2010
117views more  BMCBI 2010»
13 years 7 months ago
New decoding algorithms for Hidden Markov Models using distance measures on labellings
Background: Existing hidden Markov model decoding algorithms do not focus on approximately identifying the sequence feature boundaries. Results: We give a set of algorithms to com...
Daniel G. Brown 0001, Jakub Truszkowski
CVPR
2006
IEEE
14 years 9 months ago
A Conic Section Classifier and its Application to Image Datasets
Many problems in computer vision involving recognition and/or classification can be posed in the general framework of supervised learning. There is however one aspect of image dat...
Arunava Banerjee, Santhosh Kodipaka, Baba C. Vemur...
CVPR
2008
IEEE
14 years 9 months ago
The scale of a texture and its application to segmentation
This paper examines the issue of scale in modeling texture for the purpose of segmentation. We propose a scale descriptor for texture and an energy minimization model to find the ...
Byung-Woo Hong, Kangyu Ni, Stefano Soatto, Tony F....
ASIACRYPT
2000
Springer
13 years 11 months ago
Construction of Hyperelliptic Curves with CM and Its Application to Cryptosystems
Abstract. Construction of secure hyperelliptic curves is of most important yet most difficult problem in design of cryptosystems based on the discrete logarithm problems on hyperel...
Jinhui Chao, Kazuto Matsuo, Hiroto Kawashiro, Shig...
HASE
2008
IEEE
14 years 1 months ago
Low Cost Secure Computation for the General Client-Server Computation Model
Due to the large number of attacks on open networks, information theft becomes a more and more severe problem. Secure computation can offer highly assured confidentiality protecti...
Liangliang Xiao, I-Ling Yen, Farokh B. Bastani