Sciweavers

384 search results - page 28 / 77
» A Vector Approach to Cryptography Implementation
Sort
View
ICML
2009
IEEE
15 years 8 months ago
Fast evolutionary maximum margin clustering
The maximum margin clustering approach is a recently proposed extension of the concept of support vector machines to the clustering problem. Briefly stated, it aims at finding a...
Fabian Gieseke, Tapio Pahikkala, Oliver Kramer
ECCC
2007
144views more  ECCC 2007»
15 years 1 months ago
Algebraic Lower Bounds for Computing on Encrypted Data
In cryptography, there has been tremendous success in building primitives out of homomorphic semantically-secure encryption schemes, using homomorphic properties in a blackbox way...
Rafail Ostrovsky, William E. Skeith III
FCCM
2006
IEEE
120views VLSI» more  FCCM 2006»
15 years 8 months ago
FPGAs, GPUs and the PS2 - A Single Programming Methodology
Field programmable gate arrays (FPGAs), graphics processing units (GPUs) and Sony’s Playstation 2 vector units offer scope for hardware acceleration of applications. Implementin...
Lee W. Howes, Paul Price, Oskar Mencer, Olav Beckm...
IJRR
2010
185views more  IJRR 2010»
15 years 11 days ago
FISST-SLAM: Finite Set Statistical Approach to Simultaneous Localization and Mapping
The solution to the problem of mapping an environment and at the same time using this map to localize (the simultaneous localization and mapping, SLAM, problem) is a key prerequis...
Bharath Kalyan, K. W. Lee, W. Sardha Wijesoma
IJRR
2011
159views more  IJRR 2011»
14 years 9 months ago
Visual-inertial navigation, mapping and localization: A scalable real-time causal approach
We present a model to estimate motion from monocular visual and inertial measurements. We analyze the model and characterize the conditions under which its state is observable, an...
Eagle Jones, Stefano Soatto