Sciweavers

136 search results - page 2 / 28
» Tables of curves with many points
Sort
View
IJCV
2006
94views more  IJCV 2006»
13 years 5 months ago
Four Points in Two or Three Calibrated Views: Theory and Practice
Suppose two perspective views of four world points are given and that the intrinsic parameters are known but the camera poses and the world point positions are not. We prove that t...
David Nistér, Frederik Schaffalitzky
AICCSA
2006
IEEE
142views Hardware» more  AICCSA 2006»
13 years 11 months ago
Pipelining GF(P) Elliptic Curve Cryptography Computation
This paper proposes a new method to compute Elliptic Curve Cryptography in Galois Fields GF(p). The method incorporates pipelining to utilize the benefit of both parallel and seri...
Adnan Abdul-Aziz Gutub, Mohammad K. Ibrahim, Ahmad...
ICML
2003
IEEE
14 years 6 months ago
Regression Error Characteristic Curves
Receiver Operating Characteristic (ROC) curves provide a powerful tool for visualizing and comparing classification results. Regression Error Characteristic (REC) curves generaliz...
Jinbo Bi, Kristin P. Bennett
IROS
2006
IEEE
125views Robotics» more  IROS 2006»
13 years 11 months ago
Surface Recognition by Registering Data Curves from Touch
Model-based recognition of an object typically involves matching dense 3D range data. The computational cost is directly affected by the amount of data of which a transformation n...
Rinat Ibrayev, Yan-Bin Jia
IJNSEC
2006
94views more  IJNSEC 2006»
13 years 5 months ago
A Binary Redundant Scalar Point Multiplication in Secure Elliptic Curve Cryptosystems
The main back-bone operation in elliptic curve cryptosystems is scalar point multiplication. The most frequently used method implementing the scalar point multiplication which is ...
Sangook Moon