Sciweavers

365 search results - page 40 / 73
» Solving the Multiplication Constraint in Several Approximati...
Sort
View
AAECC
2006
Springer
133views Algorithms» more  AAECC 2006»
13 years 7 months ago
On the low hamming weight discrete logarithm problem for nonadjacent representations
So-called nonadjacent representations are commonly used in elliptic curve cryptography to facilitate computing a scalar multiple of a point on an elliptic curve. A nonadjacent rep...
James A. Muir, Douglas R. Stinson
EOR
2008
97views more  EOR 2008»
13 years 7 months ago
Decision making with hybrid influence diagrams using mixtures of truncated exponentials
Mixtures of truncated exponentials (MTE) potentials are an alternative to discretization for representing continuous chance variables in influence diagrams. Also, MTE potentials c...
Barry R. Cobb, Prakash P. Shenoy
GMP
2006
IEEE
14 years 1 months ago
Simultaneous Precise Solutions to the Visibility Problem of Sculptured Models
Abstract. We present an efficient and robust algorithm for computing continuous visibility for two- or three-dimensional shapes whose boundaries are NURBS curves or surfaces by li...
Joon-Kyung Seong, Gershon Elber, Elaine Cohen
ICASSP
2009
IEEE
14 years 2 months ago
Transmit beamforming for wireless multicasting using channel orthogonalization and local refinement
The problem of transmit beamforming for single-group multicasting is considered, where the objective is to transmit common information to a (large) number of users. The transmitte...
Ahmed Abdelkader, Imran Wajid, Alex B. Gershman, N...
GRAPHICSINTERFACE
2008
13 years 9 months ago
Background estimation from non-time sequence images
We address the problem of reconstructing the background of a scene from a set of photographs featuring several occluding objects. We assume that the photographs are obtained from ...
Miguel Granados, Hans-Peter Seidel, Hendrik P. A. ...