Sciweavers

66 search results - page 10 / 14
» Secure Linear Algebra Using Linearly Recurrent Sequences
Sort
View
IVC
2002
141views more  IVC 2002»
13 years 8 months ago
Real-time gesture recognition system and application
In this paper, we consider a vision-based system that can interpret a user's gestures in real time to manipulate windows and objects within a graphical user interface. A hand...
Chan Wah Ng, Surendra Ranganath
CDC
2010
IEEE
137views Control Systems» more  CDC 2010»
13 years 3 months ago
Left invertibility of output-quantized systems: An application to cryptography
ABSTRACT. In this paper a secure communication method is proposed, based on left invertibility of output-quantized dynamical systems. The sender uses an output-quantized linear sys...
Nevio Dubbini, Anna Carluccio, Antonio Bicchi
ARSCOM
2007
65views more  ARSCOM 2007»
13 years 8 months ago
Odd and Even Dominating Sets with Open Neighborhoods
A subset D of the vertex set V of a graph is called an open oddd dominating set if each vertex in V is adjacent to an odd number of vertices in D (adjacency is irreflexive). In t...
John L. Goldwasser, William Klostermeyer
ASIACRYPT
2000
Springer
14 years 27 days ago
Cryptanalysis of the TTM Cryptosystem
Abstract. In 1985 Fell and Diffie proposed constructing trapdoor functions with multivariate equations [11]. They used several sequentially solved stages. Another idea of building ...
Louis Goubin, Nicolas Courtois
ECCV
2000
Springer
14 years 10 months ago
A Six Point Solution for Structure and Motion
The paper has two main contributions: The rst is a set of methods for computing structure and motion for m 3 views of 6 points. It is shown that a geometric image error can be mini...
Frederik Schaffalitzky, Andrew Zisserman, Richard ...