Sciweavers

544 search results - page 64 / 109
» What cannot be computed locally!
Sort
View
STACS
1992
Springer
14 years 23 days ago
Secure Commitment Against A Powerful Adversary
abstract Rafail Ostrovskyy Ramarathnam Venkatesanz Moti Yungx Secure commitment is a primitive enabling information hiding, which is one of the most basic tools in cryptography. S...
Rafail Ostrovsky, Ramarathnam Venkatesan, Moti Yun...
CVPR
2004
IEEE
14 years 10 months ago
Shedding Light on Stereoscopic Segmentation
We propose a variational algorithm to jointly estimate the shape, albedo, and light configuration of a Lambertian scene from a collection of images taken from different vantage po...
Hailin Jin, Daniel Cremers, Anthony J. Yezzi, Stef...
ECCV
2002
Springer
14 years 10 months ago
Resolution Selection Using Generalized Entropies of Multiresolution Histograms
The performances of many image analysis tasks depend on the image resolution at which they are applied. Traditionally, resolution selection methods rely on spatial derivatives of i...
Efstathios Hadjidemetriou, Michael D. Grossberg, S...
RECOMB
2002
Springer
14 years 9 months ago
Provably sensitive Indexing strategies for biosequence similarity search
The field of algorithms for pairwisc biosequence similarity search is dominated by heuristic methods of high efficiency but uncertain sensitivity. One reason that more formal stri...
Jeremy Buhler
MOBISYS
2003
ACM
14 years 8 months ago
Reservations for Conflict Avoidance in a Mobile Database System
Mobile computing characteristics demand data management systems to support independent operation. However, the execution of updates in a mobile client usually need to be considere...
Nuno M. Preguiça, José Legatheaux Ma...