Sciweavers

18306 search results - page 3305 / 3662
» Algorithmics in Exponential Time
Sort
View
205
Voted
ISJGP
2010
15 years 22 days ago
On the Hardware Implementation Cost of Crypto-Processors Architectures
A variety of modern technologies such as networks, Internet, and electronic services demand private and secure communications for a great number of everyday transactions. Security ...
Nicolas Sklavos
CRYPTO
2010
Springer
170views Cryptology» more  CRYPTO 2010»
15 years 5 days ago
Securing Computation against Continuous Leakage
We present a general method to compile any cryptographic algorithm into one which resists side channel attacks of the only computation leaks information variety for an unbounded nu...
Shafi Goldwasser, Guy N. Rothblum
CVPR
2011
IEEE
14 years 11 months ago
A Polar Representation of Motion and Implications for Optical Flow
We explore a polar representation of optical flow in which each element of the brightness motion field is represented by its magnitude and orientation instead of its Cartesian p...
Yair Adato, Todd Zickler, Ohad Ben-Shahar
CVPR
2011
IEEE
14 years 11 months ago
Discrete-Continuous Optimization for Large-scale Structure from Motion
Recent work in structure from motion (SfM) has successfully built 3D models from large unstructured collections of images downloaded from the Internet. Most approaches use increme...
David Crandall, Andrew Owens, Noah Snavely, Daniel...
CVPR
2011
IEEE
14 years 11 months ago
Learning Context for Collective Activity Recognition
In this paper we present a framework for the recognition of collective human activities. A collective activity is defined or reinforced by the existence of coherent behavior of i...
Wongun Choi, Silvio Savarese, Khuram Shahid
« Prev « First page 3305 / 3662 Last » Next »