Sciweavers

1488 search results - page 105 / 298
» A Probabilistic Segmentation Scheme
Sort
View
TCC
2007
Springer
86views Cryptology» more  TCC 2007»
15 years 11 months ago
Weakly-Private Secret Sharing Schemes
Abstract. Secret-sharing schemes are an important tool in cryptography that is used in the construction of many secure protocols. However, the shares’ size in the best known secr...
Amos Beimel, Matthew K. Franklin
CORR
2011
Springer
169views Education» more  CORR 2011»
14 years 8 months ago
Pseudo-random graphs and bit probe schemes with one-sided error
We study probabilistic bit-probe schemes for the membership problem. Given a set A of at most n elements from the universe of size m we organize such a structure that queries of t...
Andrei E. Romashchenko
EUROPAR
2006
Springer
15 years 8 months ago
SEER: Scalable Energy Efficient Relay Schemes in MANETs
In Mobile Ad Hoc Networks (MANETs), broadcasting is widely used to support many applications. Several adaptive broadcast schemes have been proposed to reduce the number of rebroadc...
Lin-Fei Sung, Cheng-Lin Wu, Yi-Kai Chiang, Shyh-In...
161
Voted
ECCC
2006
120views more  ECCC 2006»
15 years 4 months ago
New Locally Decodable Codes and Private Information Retrieval Schemes
A q query Locally Decodable Code (LDC) encodes an n-bit message x as an N-bit codeword C(x), such that one can probabilistically recover any bit xi of the message by querying only...
Sergey Yekhanin
CVPR
2003
IEEE
16 years 7 months ago
Video-Based Face Recognition Using Probabilistic Appearance Manifolds
This paper presents a novel method to model and recognize human faces in video sequences. Each registered person is represented by a low-dimensional appearance manifold in the amb...
Kuang-Chih Lee, Jeffrey Ho, Ming-Hsuan Yang, David...