Sciweavers

1219 search results - page 17 / 244
» Where to Look Next
Sort
View
PKC
1998
Springer
95views Cryptology» more  PKC 1998»
13 years 11 months ago
Overview of Elliptic Curve Cryptography
In this article, we look at the elliptic curve cryptography, which is believed to be one of the most promising candidates for the next generation cryptographic tool. The following ...
Kiyomichi Araki, Takakazu Satoh, Shinji Miura

Book
1630views
15 years 6 months ago
Vision: a computational investigation into the human representation and processing of visual information
"What does it mean, to see? The plain man's answer (and Aristotle's, too) would be, to know what is where by looking. In other words, vision is the process of discov...
David Marr
MOBICOM
2006
ACM
14 years 1 months ago
Analysis and implications of student contact patterns derived from campus schedules
Characterizing mobility or contact patterns in a campus environment is of interest for a variety of reasons. Existing studies of these patterns can be classified into two basic a...
Vikram Srinivasan, Mehul Motani, Wei Tsang Ooi
ECCV
2008
Springer
13 years 9 months ago
SMD: A Locally Stable Monotonic Change Invariant Feature Descriptor
Extraction and matching of discriminative feature points in images is an important problem in computer vision with applications in image classification, object recognition, mosaici...
Raj Gupta, Anurag Mittal
CORR
2008
Springer
170views Education» more  CORR 2008»
13 years 7 months ago
To Broad-Match or Not to Broad-Match : An Auctioneer's Dilemma ?
We initiate the study of an interesting aspect of sponsored search advertising, namely the consequences of broad match- a feature where an ad of an advertiser can be mapped to a b...
Sudhir Kumar Singh, Vwani P. Roychowdhury