Sciweavers

525 search results - page 99 / 105
» Threshold Schemes with Disenrollment
Sort
View
EUROCRYPT
2000
Springer
14 years 1 months ago
Computing Inverses over a Shared Secret Modulus
We discuss the following problem: Given an integer shared secretly among n players and a prime number e, how can the players efficiently compute a sharing of e-1 mod . The most in...
Dario Catalano, Rosario Gennaro, Shai Halevi
MVA
2007
119views Computer Vision» more  MVA 2007»
13 years 11 months ago
Wavelet-Based Multiresolution Features for Detecting Duplications in Images
Duplication of image regions is a common method for manipulating original images using typical software like Adobe Photoshop. In this study, we propose a wavelet based feature rep...
Md. Khayrul Bashar, Keiji Noda, Noboru Ohnishi, Hi...
SODA
2001
ACM
166views Algorithms» more  SODA 2001»
13 years 11 months ago
Better approximation algorithms for bin covering
Bin covering takes as input a list of items with sizes in (0 1) and places them into bins of unit demand so as to maximize the number of bins whose demand is satis ed. This is in ...
János Csirik, David S. Johnson, Claire Keny...
TRECVID
2007
13 years 11 months ago
ENST/UOB/LU@TRECVID2007 HIGH LEVEL FEATURE EXTRACTION USING 2-LEVEL PIECEWISE GMM
We describe a high level feature extraction system for video. Video sequences are modeled using Gaussian Mixture Models. We have used those models in the past to segment video seq...
George Yazbek, Georges Kfoury, Gabriel Alam, Chafi...
WCE
2007
13 years 11 months ago
Modified Energy Efficient Cache Invalidation Algorithm in Mobile Environment
– Maintenance of the cache consistency is a complicated issue in the wireless mobile environment. Caching of frequently accessed data items on the node can reduce the bandwidth r...
S. Sankara Gomathi, S. Krishnamurthi