Sciweavers

384 search results - page 45 / 77
» A Vector Approach to Cryptography Implementation
Sort
View
ICASSP
2009
IEEE
15 years 5 months ago
Graphical Models: Statistical inference vs. determination
Using discrete Hidden-Markov-Models (HMMs) for recognition requires the quantization of the continuous feature vectors. In handwritten whiteboard note recognition it turns out tha...
Joachim Schenk, Benedikt Hörnler, Artur Braun...
CVPR
2007
IEEE
16 years 4 months ago
Real-Time License Plate Recognition on an Embedded DSP-Platform
In this paper we present a full-featured license plate detection and recognition system. The system is implemented on an embedded DSP platform and processes a video stream in real...
Clemens Arth, Florian Limberger, Horst Bischof
DAGM
2010
Springer
15 years 2 months ago
Complex Motion Models for Simple Optical Flow Estimation
The selection of an optical flow method is mostly a choice from among accuracy, efficiency and ease of implementation. While variational approaches tend to be more accurate than lo...
Claudia Nieuwenhuis, Daniel Kondermann, Christoph ...
APLAS
2010
ACM
15 years 2 months ago
Typechecking Higher-Order Security Libraries
Abstract. We propose a flexible method for verifying the security of ML programs that use cryptography and recursive data structures. Our main applications are X.509 certificate ch...
Karthikeyan Bhargavan, Cédric Fournet, Nata...
TCC
2007
Springer
110views Cryptology» more  TCC 2007»
15 years 8 months ago
Robuster Combiners for Oblivious Transfer
Abstract. A (k; n)-robust combiner for a primitive F takes as input n candidate implementations of F and constructs an implementation of F, which is secure assuming that at least k...
Remo Meier, Bartosz Przydatek, Jürg Wullschle...