Sciweavers

475 search results - page 25 / 95
» Z3-Connectivity with Independent Number 2
Sort
View
ICCV
2005
IEEE
14 years 3 months ago
Bayesian Body Localization Using Mixture of Nonlinear Shape Models
We present a 2D model-based approach to localizing human body in images viewed from arbitrary and unknown angles. The central component is a statistical shape representation of th...
Jiayong Zhang, Robert T. Collins, Yanxi Liu
APPROX
2004
Springer
125views Algorithms» more  APPROX 2004»
14 years 3 months ago
Strong Refutation Heuristics for Random k-SAT
A simple first moment argument shows that in a randomly chosen k-SAT formula with m clauses over n boolean variables, the fraction of satisfiable clauses is 1−2−k +o(1) as m/...
Amin Coja-Oghlan, Andreas Goerdt, André Lan...
MMAS
2011
Springer
13 years 21 days ago
Sweeping Preconditioner for the Helmholtz Equation: Moving Perfectly Matched Layers
This paper introduces a new sweeping preconditioner for the iterative solution of the variable coefficient Helmholtz equation in two and three dimensions. The algorithms follow th...
Björn Engquist, Lexing Ying
ENDM
2007
111views more  ENDM 2007»
13 years 9 months ago
Claw-free circular-perfect graphs
The circular chromatic number of a graph is a well-studied refinement of the chromatic number. Circular-perfect graphs is a superclass of perfect graphs defined by means of this...
Arnaud Pêcher, Xuding Zhu
FSE
2007
Springer
115views Cryptology» more  FSE 2007»
14 years 4 months ago
Improving the Security of MACs Via Randomized Message Preprocessing
Abstract. “Hash then encrypt” is an approach to message authentication, where first the message is hashed down using an ε-universal hash function, and then the resulting k-bi...
Yevgeniy Dodis, Krzysztof Pietrzak