Sciweavers

5269 search results - page 965 / 1054
» order 2007
Sort
View
SP
2007
IEEE
102views Security Privacy» more  SP 2007»
15 years 10 months ago
Improving the Robustness of Private Information Retrieval
Since 1995, much work has been done creating protocols for private information retrieval (PIR). Many variants of the basic PIR model have been proposed, including such modificati...
Ian Goldberg
ICCV
2007
IEEE
15 years 10 months ago
Simultaneous Segmentation and 3D Reconstruction of Monocular Image Sequences
When trying to extract 3D scene information and camera motion from an image sequence alone, it is often necessary to cope with independently moving objects. Recent research has un...
Kemal Egemen Ozden, Konrad Schindler, Luc J. Van G...
CIKM
2007
Springer
15 years 10 months ago
Top-k subgraph matching query in a large graph
Recently, due to its wide applications, subgraph search has attracted a lot of attention from database and data mining community. Sub-graph search is defined as follows: given a ...
Lei Zou, Lei Chen 0002, Yansheng Lu
TCC
2007
Springer
104views Cryptology» more  TCC 2007»
15 years 10 months ago
Unifying Classical and Quantum Key Distillation
Assume that two distant parties, Alice and Bob, as well as an adversary, Eve, have access to (quantum) systems prepared jointly according to a tripartite state ρABE. In addition, ...
Matthias Christandl, Artur Ekert, Michal Horodecki...
PAMI
2007
127views more  PAMI 2007»
15 years 4 months ago
Text-Independent Writer Identification and Verification Using Textural and Allographic Features
—The identification of a person on the basis of scanned images of handwriting is a useful biometric modality with application in forensic and historic document analysis and const...
Marius Bulacu, Lambert Schomaker