Sciweavers

892 search results - page 133 / 179
» et 2007
Sort
View
CISC
2007
Springer
156views Cryptology» more  CISC 2007»
14 years 2 months ago
Deniable Authentication on the Internet
Deniable authentication is a technique that allows one party to send messages to another while the latter can not prove to a third party the fact of communication. In this paper, w...
Shaoquan Jiang
CIVR
2007
Springer
157views Image Analysis» more  CIVR 2007»
14 years 2 months ago
Using multiple segmentations for image auto-annotation
Automatic image annotation techniques that try to identify the objects in images usually need the images to be segmented first, especially when specifically annotating image reg...
Jiayu Tang, Paul H. Lewis
CIVR
2007
Springer
199views Image Analysis» more  CIVR 2007»
14 years 2 months ago
New local descriptors based on dissociated dipoles
This paper describes new local photometric descriptors based on dissociated dipoles for transformed images or rigid objects retrieval. Dissociated dipoles are non local different...
Alexis Joly
COCO
2007
Springer
96views Algorithms» more  COCO 2007»
14 years 2 months ago
Unbalanced Expanders and Randomness Extractors from Parvaresh-Vardy Codes
We give an improved explicit construction of highly unbalanced bipartite expander graphs with expansion arbitrarily close to the degree (which is polylogarithmic in the number of ...
Venkatesan Guruswami, Christopher Umans, Salil P. ...
COCOON
2007
Springer
14 years 2 months ago
Can a Graph Have Distinct Regular Partitions?
The regularity lemma of Szemer´edi gives a concise approximate description of a graph via a so called regular-partition of its vertex set. In this paper we address the following ...
Noga Alon, Asaf Shapira, Uri Stav