Sciweavers

11384 search results - page 507 / 2277
» Achieved IPC Performance
Sort
View
ASIACRYPT
2008
Springer
15 years 7 months ago
Graph Design for Secure Multiparty Computation over Non-Abelian Groups
Recently, Desmedt et al. studied the problem of achieving secure n-party computation over non-Abelian groups. They considered the passive adversary model and they assumed that the...
Xiaoming Sun, Andrew Chi-Chih Yao, Christophe Tart...
BIOID
2008
150views Biometrics» more  BIOID 2008»
15 years 7 months ago
A Palmprint Verification System Based on Phase Congruency Features
The paper presents a fully automatic palmprint verification system which uses 2D phase congruency to extract line features from a palmprint image and subsequently performs linear d...
Vitomir Struc, Nikola Pavesic
142
Voted
ASPDAC
2005
ACM
104views Hardware» more  ASPDAC 2005»
15 years 7 months ago
Low-power techniques for network security processors
Abstract— In this paper, we present several techniques for lowpower design, including a descriptor-based low-power scheduling algorithm, design of dynamic voltage generator, and ...
Yi-Ping You, Chun-Yen Tseng, Yu-Hui Huang, Po-Chiu...
132
Voted
DAGM
2008
Springer
15 years 6 months ago
Implicit Feedback between Reconstruction and Tracking in a Combined Optimization Approach
In this work, we present a combined approach to tracking and reconstruction. An implicit feedback of 3d information to the tracking process is achieved by optimizing a single error...
Olaf Kähler, Joachim Denzler
128
Voted
ACL
2007
15 years 6 months ago
Pipeline Iteration
This paper presents pipeline iteration, an approach that uses output from later stages of a pipeline to constrain earlier stages of the same pipeline. We demonstrate significant ...
Kristy Hollingshead, Brian Roark