Sciweavers

275 search results - page 29 / 55
» The double CFTP method
Sort
View
ICIAP
1999
ACM
14 years 2 months ago
Improved Entropic Edge-Detection
Using the Jensen-Shannon divergence of grey level histograms obtained by sliding a double window over an image, an edge-detector is presented. A new technique for linking unconnec...
J. Gómez Lopera, N. Ilhami, P. Luque Escami...
FC
2010
Springer
230views Cryptology» more  FC 2010»
14 years 2 months ago
Multiple Denominations in E-cash with Compact Transaction Data
We present a new construction of divisible e-cash that makes use of 1) a new generation method of the binary tree of keys; 2) a new way of using bounded accumulators. The transacti...
Sébastien Canard, Aline Gouget
CRYPTO
1991
Springer
150views Cryptology» more  CRYPTO 1991»
14 years 1 months ago
CM-Curves with Good Cryptographic Properties
Our purpose is to describe elliptic curves with complex multiplication which in characteristic 2 have the following useful properties for constructing Diffie-HeUman type cryptosys...
Neal Koblitz
LREC
2008
126views Education» more  LREC 2008»
13 years 11 months ago
Phrase-Based Machine Translation based on Simulated Annealing
In this paper, we propose a new phrase-based translation model based on inter-lingual triggers. The originality of our method is double. First we identify common source phrases. T...
Caroline Lavecchia, David Langlois, Kamel Smaï...
MASCOTS
2003
13 years 11 months ago
Toward Scaling Network Emulation using Topology Partitioning
Scalability is the primary challenge to studying large complex network systems with network emulation. This paper studies topology partitioning, assigning disjoint pieces of the n...
Ken Yocum, Ethan Eade, Julius Degesys, David Becke...