Sciweavers

1282 search results - page 201 / 257
» Signing on signing off
Sort
View
ICCV
1999
IEEE
14 years 2 months ago
Real-Time Object Detection for "Smart" Vehicles
This paper presents an e cient shape-based object detection method based on Distance Transforms and describes its use for real-time vision on-board vehicles. The method uses a tem...
Dariu Gavrila, Vasanth Philomin
EUROCRYPT
1999
Springer
14 years 2 months ago
An Analysis of Exponentiation Based on Formal Languages
A recoding rule for exponentiation is a method for reducing the cost of the exponentiation ae by reducing the number of required multiplications. If w(e) is the (hamming) weight of...
Luke O'Connor
SCALESPACE
1999
Springer
14 years 2 months ago
Nonlinear PDEs and Numerical Algorithms for Modeling Levelings and Reconstruction Filters
In this paper we develop partial differential equations (PDEs) that model the generation of a large class of morphological filters, the levelings and the openings/closings by rec...
Petros Maragos, Fernand Meyer
MAS
1998
Springer
172views Communications» more  MAS 1998»
14 years 2 months ago
Protecting Mobile Agents Against Malicious Hosts
A key element of any mobile code based distributed system are the security mechanisms available to protect (a) the host against potentially hostile actions of a code fragment under...
Tomas Sander, Christian F. Tschudin
ESORICS
1994
Springer
14 years 2 months ago
Oblivious Signatures
Abstract. An oblivious signature with n keys (or messages) is a signature that the recipient can choose one of n keys (or messages) to get signed while the signer cannot find out o...
Lidong Chen