Sciweavers

6906 search results - page 36 / 1382
» An algorithm for modelling key terms
Sort
View
EUROCRYPT
2010
Springer
15 years 2 months ago
Bounded Key-Dependent Message Security
We construct the first public-key encryption scheme that is proven secure (in the standard model, under standard assumptions) even when the attacker gets access to encryptions of ...
Boaz Barak, Iftach Haitner, Dennis Hofheinz, Yuval...
BMVC
2010
14 years 7 months ago
Joint Modeling of Algorithm Behavior and Image Quality for Algorithm Performance Prediction
In this paper, we propose a framework for predicting the performance of a vision algorithm given the input image or video so as to maximize the algorithm's ability to provide...
Apurva Gala, Shishir Shah
EDBT
2010
ACM
180views Database» more  EDBT 2010»
15 years 4 months ago
BSkyTree: scalable skyline computation using a balanced pivot selection
Skyline queries have gained a lot of attention for multicriteria analysis in large-scale datasets. While existing skyline algorithms have focused mostly on exploiting data dominan...
Jongwuk Lee, Seung-won Hwang
CVPR
2009
IEEE
15 years 4 months ago
On compositional Image Alignment, with an application to Active Appearance Models
Efficient and accurate fitting of Active Appearance Models (AAM) is a key requirement for many applications. The most efficient fitting algorithm today is Inverse Compositiona...
Brian Amberg, Andrew Blake, Thomas Vetter
SIGMETRICS
2002
ACM
128views Hardware» more  SIGMETRICS 2002»
14 years 9 months ago
High-density model for server allocation and placement
It is well known that optimal server placement is NP-hard. We present an approximate model for the case when both clients and servers are dense, and propose a simple server alloca...
Craig W. Cameron, Steven H. Low, David X. Wei